Search
Now showing items 11-15 of 15
Performance evaluation of kerberos cross-realm authentication using SIMNET
(Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
Today, the network is being implemented in such a manner that consist of geographi-
cally diverse clients and distributed as well as centralized servers. To prevent unauthorized access to system resources such as servers, ...
Protecting structures on heap from buffer overflow vulnerabilities with TIED-LibsafePlus
(Dhirubhai Ambani Institute of Information and Communication Technology, 2005)
In spite of the numerous defenses that have been devised to combat the buffer overflow attack, buffer overflow vulnerability in the C programs still exist as the one widely exploited by the attackers to subsume the privileges ...
Web services policy in grid
(Dhirubhai Ambani Institute of Information and Communication Technology, 2008)
Service-oriented computing enables service providers to publish their business functionalities in the form of abstract contracts, which can be discovered by service consumers based on open and standard protocols. Enterprise ...
Automatic Compact Alphanumeric Encoding of Shellcode
(Dhirubhai Ambani Institute of Information and Communication Technology, 2016)
Shellcode is a machine code that is injected in the form of a string to exploit buffer overflows. It generally contains non-ASCII bytes as not all machine instructions have their encoding bytes in ASCII range. To mitigate ...
hybrid approach to digital image watermarking using informed coding, informed embedding and spread spectrum
(Dhirubhai Ambani Institute of Information and Communication Technology, 2006)
The growth and popularity of the Internet has led to the data storage of multimedia data (audio, image and video) in digital form. The digitization form of multimedia data can be copied easily and then distributed again ...