Now showing items 1-11 of 11

    • Channel quality prediction and localization 

      Patel, Animesh (Dhirubhai Ambani Institute of Information and Communication Technology, 2007)
      In this thesis we focus on two problems, Channel Quality Prediction and Localization in wireless network. In High-Speed Downlink Packet Access (HSDPA) architecture of Universal Mobile Telecommunications Services (UMTS), ...
    • Collusion resistant fingerprinting 

      Juneja, Sandeep (Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
      Digital watermarking is used to carry information by embedding information into the cover data in a perceptually visible or non visible manner. In today's sea of digital information, there are many problems associated ...
    • Enhancement of misbehavior detection scheme for vehicular ad-hoc networks 

      Jain, Shefali (Dhirubhai Ambani Institute of Information and Communication Technology, 2012)
      Vehicular ad hoc networks (VANETs) will facilitate various safety and non-safety applications to be deployed in the future. A vehicle in a VANET can misbehave by sending false or inaccurate information to other vehicles. ...
    • Improvement of tagged architecture for preventing software vulnerabilities 

      Shah, Tejaskumar (Dhirubhai Ambani Institute of Information and Communication Technology, 2008)
      In spite of the many defense techniques, software vulnerabilities like buffer overflow, format string vulnerability and integer vulnerability is still exploited by attackers. These software vulnerabilities arise due to ...
    • Modeling and detecting attacks against key agreement protocols 

      Yadav, Anshu (Dhirubhai Ambani Institute of Information and Communication Technology, 2012)
      Key agreement protocols establish a shared secret key between two or more communicating parties willing to exchange data over insecure channels using symmetric key cryptography. Based on the number of members involved ...
    • Performance evaluation of kerberos cross-realm authentication using SIMNET 

      Sethi, Ankit Kumar (Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
      Today, the network is being implemented in such a manner that consist of geographi- cally diverse clients and distributed as well as centralized servers. To prevent unauthorized access to system resources such as servers, ...
    • Queueing-theoretic framework for perfermance analysis of mobile ad hoc networks with finite buffer nodes 

      Shah, Sapan (Dhirubhai Ambani Institute of Information and Communication Technology, 2008)
      Wireless Ad Hoc network is a decentralized wireless network which allows nodes to join and create networks without any infrastructure. These kinds of networks are advantageous because they can be readily deployed anywhere, ...
    • Secure data delivery in mobile ad hoc network using multiple paths 

      Maheshwari, Mayur (Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
      A mobile ad hoc network (MANET) is a self configurable, self organized, infrastructure less multi hop mobile wireless network.Characteristics of ad hoc network make security a critical issue i.e. any node can join the ...
    • Security analysis of two fair exchange protocols 

      Gahlot, Jai (Dhirubhai Ambani Institute of Information and Communication Technology, 2007)
      E-commerce applications enable two parties to exchange digital items electronically. It is critical for such applications that the underlying protocols ensure the fairness requirement: no honest participant should suffer ...
    • Web services policy in grid 

      Desai, Amee Anilbhai (Dhirubhai Ambani Institute of Information and Communication Technology, 2008)
      Service-oriented computing enables service providers to publish their business functionalities in the form of abstract contracts, which can be discovered by service consumers based on open and standard protocols. Enterprise ...
    • Wireless LAN 802.11 security using elliptic curve cryptography 

      Singh, Saurabh (Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
      IEEE 802.11 is a standard defines the specification of Wireless Local Area Network (WLAN), came into existence in 1997. As communication medium is wireless, security is a major concern to protect the data from adversary. ...