Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "Rajkumar, M. Newlin" wg kryterium: Autor


Wyświetlanie 1-7 z 7
Tytuł:
Survey a secured privacy authentication with recovery
Autorzy:
Rajkumar, M. Newlin
Dhurka, V.
Kayathri, P.
Tematy:
Password
Authentication
OTP
Pokaż więcej
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Powiązania:
https://bibliotekanauki.pl/articles/1192095.pdf  Link otwiera się w nowym oknie
Opis:
Every person has his own data and needs it to be secure, so authentication and acceptance were found to be essential. Most web based applications are based on password level authentication only. Since passwords are easily prone to be attacked, a better authentication is needed. The biometrics and the biometric way of authentication came to existence but this also suffered from the drawback of excess hardware and complex mechanisms. This paper presents a simple and efficient user authentication approach based on OTP with four digit pin number. When the user logins into the system, the login password is matches with database and if they match, the user is identified as a legitimate user. Further, an OTP is generated and sent to the user. The user enter the OTP along with four digit pin. If this combined OTP and four digit pin is matched with database, user is authenticated. Otherwise user is not allowed to access. This achieves better authentication and efficiency. If user forget their password, recovery phase is available. In this phase user have to answer the query which is based on the image that is displayed by server. If the answer is matches, then password reset link will send to user’s mail id. This recovery method is not vulnerable to password resetting attack. This paper provides different types of password, types of authentication and types of attack.
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Security Requirements and Mechanisms in Vehicular Ad-Hoc Networks (VANET)
Autorzy:
Rajkumar, M. Newlin
Nithya, M.
Krithika, M.
Tematy:
ARAN
ARIADNE
Ad-hoc Networks
NDM
SEAD
VANET
Vehicular Ad-hoc Network
mobile Ad-hoc network
Pokaż więcej
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Powiązania:
https://bibliotekanauki.pl/articles/1193569.pdf  Link otwiera się w nowym oknie
Opis:
In recent years, Vehicles are becomes the more intellectual system which is operated with the help of radio communications. Thus the vehicles are formed the network for communications based on the mobile Ad- hoc network (MANET) which is called as Vehicular Ad-hoc Network (VANET). However security in Vehicular Ad-hoc Networks (VANET) should become great challenges, due to communication development, because of dynamically changing protocols, high mobility of vehicles and also high partitioned network. In this paper we address the security requirements of vehicles and needed mechanisms to avoid the threats and attacks in VANET.
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Survey on Message Filtering Techniques for On-line Social Network
Autorzy:
Rajkumar, M. Newlin
Kayathri, P.
Dhurka, V.
Tematy:
On-line Social Network
filtering rule
text classification
blacklist
Pokaż więcej
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Powiązania:
https://bibliotekanauki.pl/articles/1191459.pdf  Link otwiera się w nowym oknie
Opis:
A social network is a set of people or organizations or other social entities connected by set of social relationships such as friendship, co-working or information exchange. Online Social Networks (OSN) usually not support to the user for message filtering. To solve this issue, which allows OSN users to have a direct control on the messages posted on their walls. The users can control the unwanted messages posted on their own private space .To avoid unwanted messages displayed and they can also block their friend from friends list using filtering rule, content based filtering and short text classification.
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Survey of Secure Two Parties Confidential Information Release in Vertical Partitioned Data
Autorzy:
Rajkumar, M. Newlin
Vijayalakshmi, A.
Shiny, M. U.
Tematy:
Differential privacy
Two party algorithm
Exponential Mechanism
Pokaż więcej
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Powiązania:
https://bibliotekanauki.pl/articles/1192114.pdf  Link otwiera się w nowym oknie
Opis:
To securely give person-exact fragile data from two data providers, whereby the mutual data maintains the necessary information for behind data mining tasks. Secured information distributed locations the problem of discovery delicate information when mining for useful data. In this paper, we address the problem of private data publishing, where personal uniqueness for the similar arrangement of people is detained by two parties. Differential privacy is a detailed security show that makes no doubt around an adversary's experience background knowledge. A differentially-private module ensures that the probability of any output (discharged information) is immediately as likely from all about the same information sets and therefore ensures that all outputs are merciless to any singular's data. As it were, a singular's privacy is not at risk in light of the interest in the data set. Specifically, we show a control for differentially private data discharge for vertically-distributed data between two parties in the semi-genuine adversary model. We first present a two-party convention for the exponential mechanism .This convention can be used as a sub convention by some other computation that requires the exponential component in a distributed setting. Likewise, we propose a two-party algorithm that discharges Differentially-private information in a secure way as per the significance of secure multiparty computation.
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Survey of Several IP Traceback Mechanisms and Path Reconstruction
Autorzy:
Rajkumar, M. Newlin
Amsarani, R.
Shiny, M. U.
Tematy:
Dos attack
Packet marking
Packet logging
Probabilistic packet marking
Hash based scheme
reflector attack
ICMP
passive IP traceback
contol flooding
input debugging
Pokaż więcej
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Powiązania:
https://bibliotekanauki.pl/articles/1191427.pdf  Link otwiera się w nowym oknie
Opis:
In real world the peoples having a lot of attacks troubles in the network. The unauthorized persons or hackers are use the another person’s IP address or use the attackers nearest IP address with in the area. If some kinds attacks such as DOS, DDOS attacks are create a lot of issues in network so difficult to find the spoofers or attackers. In this papper presents the Several IP Traceback Mechanism and Path Reconstruction.
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Topology Based Routing Protocols in Vehicular Ad-Hoc Networks (VANET)
Autorzy:
Rajkumar, M. Newlin
Nithya, M.
Hemalatha, P.
Rajeswari, R.
Tematy:
AODV
DSR
TORA
Topology based routing
VANET
reactive routing
Pokaż więcej
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Powiązania:
https://bibliotekanauki.pl/articles/1193566.pdf  Link otwiera się w nowym oknie
Opis:
Vehicular Ad-hoc network (VANET) is an exacting form of Mobile Ad-hoc Network (MANET) where the vehicles are act as nodes. Due to high mobility of nodes, high partitioned network and also dynamic changing routing protocols, the routing in Vanet is dispute one. The routing protocols functions should depends on the internal and external characteristics of VANET such as nodes mobility, road topology and obstacles which block the signal. A routing protocol is used to find the route between the nodes to communicate each other. The particular route to be selected by routing protocol. The routers have the information about the network which is directly connected to it. The routing protocol first forward the information to the immediate neighbor node, then it forward the information throughout the network. In VANET the routing protocol are classify based on topology, position of vehicle, cluster based vehicle, broadcast based routing and geocast based routing. This article explains the topology based routing protocol, especially reactive routing protocol which is a part of the topology based routing protocol.
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Detection of wormhole attack using cooperative bait detection scheme
Autorzy:
Rajkumar, M. Newlin
Shiny, M. U.
Rani, R. Amsa
Tematy:
index terms-cooperative bait detection scheme (cbds)
dynamic source routing (dsr)
mobile adhoc network (manet)
wormhole attacks
Pokaż więcej
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Powiązania:
https://bibliotekanauki.pl/articles/1182916.pdf  Link otwiera się w nowym oknie
Opis:
Mobile Ad-Hoc Network is an wireless systems it supports mobile communication in a network. MANETs are affected by several security attacks but it affects the features that are like open medium, dynamical changes in topology, lack of central monitoring and management and it not obtain the clear defence mechanism to MANETs. To prevent or detect malicious nodes launching collaborative wormhole attacks is a challenge. The existing system designs a dynamic source routing (DSR)-based routing mechanism, but it is also referred to as the cooperative bait detection scheme (CBDS) to detect the wormhole attacks effectively. Here we describes the various wormhole attacks and prevention methods for wormhole attack.
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-7 z 7

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies