Search
Now showing items 1-5 of 5
Collusion resistant fingerprinting
(Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
Digital watermarking is used to carry information by embedding information into the
cover data in a perceptually visible or non visible manner. In today's sea of digital
information, there are many problems associated ...
Modeling and detecting attacks against key agreement protocols
(Dhirubhai Ambani Institute of Information and Communication Technology, 2012)
Key agreement protocols establish a shared secret key between two or more communicating
parties willing to exchange data over insecure channels using symmetric key cryptography.
Based on the number of members involved ...
Multipath verification defense against SSL stripping attack
(Dhirubhai Ambani Institute of Information and Communication Technology, 2013)
SSL stripping attack is a man- in- the- middle attack which poses a serious threat to the security of secure socket layer protocol. In SSL stripping attack the attacker has ability to downgrade security of SSL protected ...
Performance evaluation of kerberos cross-realm authentication using SIMNET
(Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
Today, the network is being implemented in such a manner that consist of geographi-
cally diverse clients and distributed as well as centralized servers. To prevent unauthorized access to system resources such as servers, ...
Automatic Compact Alphanumeric Encoding of Shellcode
(Dhirubhai Ambani Institute of Information and Communication Technology, 2016)
Shellcode is a machine code that is injected in the form of a string to exploit buffer overflows. It generally contains non-ASCII bytes as not all machine instructions have their encoding bytes in ASCII range. To mitigate ...