Search
Now showing items 1-10 of 15
Secure and efficient key assignment scheme for dynamic access control in a hierarchy
(Dhirubhai Ambani Institute of Information and Communication Technology, 2006)
The users belonging to an organization are often assigned different access permissions depending on their security class. In this situation, the users belonging to a higher security class are allowed access to the information ...
Protecting mobile agents against malicious hosts using trusted computing
(Dhirubhai Ambani Institute of Information and Communication Technology, 2005)
The concept of mobile agents was invented about a decade ago. Since then, plenty of innovative applications of mobile agents have been proposed. But it remains to be the fact that these applications have not been deployed ...
Security analysis of two fair exchange protocols
(Dhirubhai Ambani Institute of Information and Communication Technology, 2007)
E-commerce applications enable two parties to exchange digital items electronically. It is critical for such applications that the underlying protocols ensure the fairness requirement: no honest participant should suffer ...
Collusion resistant fingerprinting
(Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
Digital watermarking is used to carry information by embedding information into the
cover data in a perceptually visible or non visible manner. In today's sea of digital
information, there are many problems associated ...
Contributions to parasitic computing
(Dhirubhai Ambani Institute of Information and Communication Technology, 2005)
Internet is a huge connection of networks. To ensure reliable communication on the Internet a layered architecture is used, with various protocols functional at each layer. The way these protocols are used on the Internet, ...
Effect of channel asymmetry on reputation based cooperation mechanisms in mobile ad-hoc networks
(Dhirubhai Ambani Institute of Information and Communication Technology, 2008)
Enforced cooperation among MANET nodes is an active research issue. In applications, where the users have different goals and there is no central authority to control them, users may become selfish. These nodes may not ...
Efficient ASIC implementation of advanced encryption standard
(Dhirubhai Ambani Institute of Information and Communication Technology, 2008)
In spite of the many defense techniques, software vulnerabilities like buffer overflow, format string vulnerability and integer vulnerability is still exploited by attackers. These software vulnerabilities arise due to ...
Formal analysis of two standardized protocols using standard spaces
(Dhirubhai Ambani Institute of Information and Communication Technology, 2008)
To achieve secure communication it is critical to provide protocols which are secure against attacks. Formal methods are helpful in finding whether or not a protocol is secure. The first formal method for this task, namely ...
Modeling and detecting attacks against key agreement protocols
(Dhirubhai Ambani Institute of Information and Communication Technology, 2012)
Key agreement protocols establish a shared secret key between two or more communicating
parties willing to exchange data over insecure channels using symmetric key cryptography.
Based on the number of members involved ...
Multipath verification defense against SSL stripping attack
(Dhirubhai Ambani Institute of Information and Communication Technology, 2013)
SSL stripping attack is a man- in- the- middle attack which poses a serious threat to the security of secure socket layer protocol. In SSL stripping attack the attacker has ability to downgrade security of SSL protected ...