Journal Article
Permanent URI for this collectionhttps://ir.daiict.ac.in/handle/123456789/37
Browse
8 results
Search Results
Publication Metadata only An improved bilinear pairing based remote user authentication scheme(Elsevier, 01-01-2009) Goriparthi, Thulasi; Saxena, Ashutosh; Das, Maniklal; DA-IICT, GandhinagarRecently Das et al. proposed a novel remote user authentication scheme using bilinear pairings. Chou et al. identified a weakness in Das et al.'s scheme and made an improvement. In this paper, we show that both Das et al.'s and Chou et al.'s schemes are insecure against forgery and replay attacks. We proposed an improved scheme that overcomes the security flaws without affecting the merits of the original scheme.Publication Metadata only Algorithms and approaches of proxy signature: A survey(01-11-2009) Saxena, Ashutosh; Phatak, Deepak B; Das, Maniklal; DA-IICT, GandhinagarThis paper reviews the recent advances on proxy signatures, discusses few notable proposals, analyzes schemes' security and efficiency, and provides an overall remark of these proposals.Publication Metadata only Evaluation of a suite of metrics for component based software engineering(01-04-2009) Narasimhan,; Lakshmi, V; Parthasarathy, P T; Das, Maniklal; DA-IICT, GandhinagarComponent-Based Software Engineering (CBSE) has shown significant prospects in rapid production of large software systems with enhanced quality, and emphasis on decomposition of the engineered systems into functional or logical components with well-defined interfaces used for communication across the components. In this paper, a series of metrics proposed by various researchers have been analyzed, evaluated and benchmarked using several large-scale publicly available software systems. A systematic analysis of the values for various metrics has been carried out and several key inferences have been drawn from them. A number of useful conclusions have been drawn from various metrics evaluations, which include inferences on complexity, reusability, testability, modularity and stability of the underlying components. The inferences are argued to be beneficial for CBSE-based software development, integration and maintenance.Publication Metadata only Two-factor user authentication in wireless sensor networks(IEEE, 01-03-2009) Das, Manik Lal; Das, Maniklal; DA-IICT, GandhinagarWireless sensor networks (WSN) are typically deployed in an unattended environment, where the legitimate users can login to the network and access data as and when demanded. Consequently, user authentication is a primary concern in this resource-constrained environment before accessing data from the sensor/gateway nodes. In this letter, we present a two-factor user authentication protocol for WSN, which provides strong authentication, session key establishment, and achieves efficiency.Publication Metadata only Securing wireless sensor networks with public key techniques(Olyptr ldc Irldsus, 01-07-2008) Kumar, Vidhani; Das, Maniklal; DA-IICT, GandhinagarEmotional contagion is said to occur when an origin (i.e., any sensory stimuli) emanating emotions causes the observer to feel the same emotions. In this paper, we explore the identification and quantification of emotional contagion produced by music in human beings. We survey 50 subjects who answer: what type of music they hear when they are happy, excited, sad, angry, and affectionate. In the analysis of the distribution, we observe that predominantly the emotional state of the subjects does influence the choice of�tempo�of the musical piece. We define the footprint in three dimensions, namely, sentiment, time, and identification. We unpack each song by unraveling sentiment analysis in time, using lexicons and tenses, along with the identity via pronouns used. In this study, we wish to quantify and visualize the emotional journey of the listener through music. The results of this can be extended to the elicitation of emotional contagion within any story, poem, and conversations.Publication Metadata only Dynamic program update in wireless sensor networks using orthogonality principle(IEEE, 13-06-2008) Joshi,; Akash,; Das, Maniklal; DA-IICT, Gandhinagar; Joshi, Akash (200301203)In this research two protocols are being proposed for analysing the utilization and blocking probability of each station to the access point. The first protocol is based on Markovian Queuing based Single channel Single Access Point protocol with Blocking Probability (MQSSABP) where the stations are associated with a single access point. The calculations are being done based on M/M/1/N based queuing model. It is necessary to avoid long block off time to measure the value of blocking probability. The measure of utilization and throughput has also been obtained in the work. The second protocol proposed is Markovian Queuing based Single channel Multi Access Point protocol with Blocking Probability (MQSMABP) where the stations may associate with various access points. The calculation has been done based on M/M/c/N based queuing model and the measure of utilization and throughput has been obtained. The performance of the protocols has been measured both numerically and through simulations.Publication Metadata only Comments on "Improved efficient remote user authentication schemes"(01-05-2008) Das, Manik Lal; Das, Maniklal; DA-IICT, GandhinagarRecently, Tian et al. presented an article, in which they discussed some security weaknesses of Yoon et al.�s scheme and subsequently proposed two �improved� schemes. In this paper, we show that the Tian et al.�s schemes are insecure and vulnerable than the Yoon et al.�s scheme. Keywords: Authentication, smart card, timestampPublication Metadata only An improved and efficient micro-payment scheme(01-04-2009) Bayyapu,; Praneetha,; Das, Maniklal; DA-IICT, Gandhinagar; Bayyapu, Praneetha (200301023)The rapid growth of data communications networks in recent years has led to enormous development in electronic commerce. Internet banking and trading are two important applications that execute financial transaction from anywhere in the world. This enables banks and merchants to simplify their financial transaction process as well as to provide customer friendly service 24-hours a day. On one hand the cost of manpower and infrastructure comes down drastically and on the other hand the cost of transportation, third party royalty and securing customer information is increased. Electronic micro-payment is one of the most important research topics in electronic commerce, particularly, low-cost online payment scenarios and offline payments in rural areas. In this paper, we discuss some of the important micro-payment schemes, observe their merits and limitations, and then propose an improved micro-payment scheme. We discuss two basic micro-payment schemes, which use the public/private key concept and then we review another scheme that uses the concept of hash chain. We observe certain limitations in these and related schemes, which motivate us to extend one of the attractive schemes, namely, the Hwang and Sung� scheme [8], towards more efficient, retaining all other features intact without compromising the security strength of the scheme. We compare the improved scheme with others and show that the improved scheme provides better security and efficiency, which enables the scheme viable for real-world applications, in particular, in resource-constrained environments such as mobile payment through handheld devices or customer�s chip card for debit/credit transaction through point of sale terminal