Search
Now showing items 1-4 of 4
Efficient ASIC implementation of advanced encryption standard
(Dhirubhai Ambani Institute of Information and Communication Technology, 2008)
In spite of the many defense techniques, software vulnerabilities like buffer overflow, format string vulnerability and integer vulnerability is still exploited by attackers. These software vulnerabilities arise due to ...
Formal analysis of two standardized protocols using standard spaces
(Dhirubhai Ambani Institute of Information and Communication Technology, 2008)
To achieve secure communication it is critical to provide protocols which are secure against attacks. Formal methods are helpful in finding whether or not a protocol is secure. The first formal method for this task, namely ...
Performance analysis of TCP over enhanced UMTS network
(Dhirubhai Ambani Institute of Information and Communication Technology, 2008)
The increase in demand and overwhelming response of 3G mobile networks has made it a technology which would drive the future of mobile communication. On the other hand the popularity of the Internet has also increased with ...
Web services policy in grid
(Dhirubhai Ambani Institute of Information and Communication Technology, 2008)
Service-oriented computing enables service providers to publish their business functionalities in the form of abstract contracts, which can be discovered by service consumers based on open and standard protocols. Enterprise ...