Search
Now showing items 1-10 of 10
Secure and efficient key assignment scheme for dynamic access control in a hierarchy
(Dhirubhai Ambani Institute of Information and Communication Technology, 2006)
The users belonging to an organization are often assigned different access permissions depending on their security class. In this situation, the users belonging to a higher security class are allowed access to the information ...
Protecting mobile agents against malicious hosts using trusted computing
(Dhirubhai Ambani Institute of Information and Communication Technology, 2005)
The concept of mobile agents was invented about a decade ago. Since then, plenty of innovative applications of mobile agents have been proposed. But it remains to be the fact that these applications have not been deployed ...
Security analysis of two fair exchange protocols
(Dhirubhai Ambani Institute of Information and Communication Technology, 2007)
E-commerce applications enable two parties to exchange digital items electronically. It is critical for such applications that the underlying protocols ensure the fairness requirement: no honest participant should suffer ...
Contributions to parasitic computing
(Dhirubhai Ambani Institute of Information and Communication Technology, 2005)
Internet is a huge connection of networks. To ensure reliable communication on the Internet a layered architecture is used, with various protocols functional at each layer. The way these protocols are used on the Internet, ...
Effect of channel asymmetry on reputation based cooperation mechanisms in mobile ad-hoc networks
(Dhirubhai Ambani Institute of Information and Communication Technology, 2008)
Enforced cooperation among MANET nodes is an active research issue. In applications, where the users have different goals and there is no central authority to control them, users may become selfish. These nodes may not ...
Efficient ASIC implementation of advanced encryption standard
(Dhirubhai Ambani Institute of Information and Communication Technology, 2008)
In spite of the many defense techniques, software vulnerabilities like buffer overflow, format string vulnerability and integer vulnerability is still exploited by attackers. These software vulnerabilities arise due to ...
Formal analysis of two standardized protocols using standard spaces
(Dhirubhai Ambani Institute of Information and Communication Technology, 2008)
To achieve secure communication it is critical to provide protocols which are secure against attacks. Formal methods are helpful in finding whether or not a protocol is secure. The first formal method for this task, namely ...
Protecting structures on heap from buffer overflow vulnerabilities with TIED-LibsafePlus
(Dhirubhai Ambani Institute of Information and Communication Technology, 2005)
In spite of the numerous defenses that have been devised to combat the buffer overflow attack, buffer overflow vulnerability in the C programs still exist as the one widely exploited by the attackers to subsume the privileges ...
Web services policy in grid
(Dhirubhai Ambani Institute of Information and Communication Technology, 2008)
Service-oriented computing enables service providers to publish their business functionalities in the form of abstract contracts, which can be discovered by service consumers based on open and standard protocols. Enterprise ...
hybrid approach to digital image watermarking using informed coding, informed embedding and spread spectrum
(Dhirubhai Ambani Institute of Information and Communication Technology, 2006)
The growth and popularity of the Internet has led to the data storage of multimedia data (audio, image and video) in digital form. The digitization form of multimedia data can be copied easily and then distributed again ...