Search
Now showing items 1-5 of 5
Security analysis of two fair exchange protocols
(Dhirubhai Ambani Institute of Information and Communication Technology, 2007)
E-commerce applications enable two parties to exchange digital items electronically. It is critical for such applications that the underlying protocols ensure the fairness requirement: no honest participant should suffer ...
Efficient ASIC implementation of advanced encryption standard
(Dhirubhai Ambani Institute of Information and Communication Technology, 2008)
In spite of the many defense techniques, software vulnerabilities like buffer overflow, format string vulnerability and integer vulnerability is still exploited by attackers. These software vulnerabilities arise due to ...
Formal analysis of two standardized protocols using standard spaces
(Dhirubhai Ambani Institute of Information and Communication Technology, 2008)
To achieve secure communication it is critical to provide protocols which are secure against attacks. Formal methods are helpful in finding whether or not a protocol is secure. The first formal method for this task, namely ...
Performance evaluation of kerberos cross-realm authentication using SIMNET
(Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
Today, the network is being implemented in such a manner that consist of geographi-
cally diverse clients and distributed as well as centralized servers. To prevent unauthorized access to system resources such as servers, ...
Web services policy in grid
(Dhirubhai Ambani Institute of Information and Communication Technology, 2008)
Service-oriented computing enables service providers to publish their business functionalities in the form of abstract contracts, which can be discovered by service consumers based on open and standard protocols. Enterprise ...