Volume 1 Number 3 September 2010

    
Building Reliability Model in Grid Computing

Vivekananth. P

https://doi.org/

Abstract In the recent period, Grid computing has emerged as the incremental level of distributed computing. It integrates the users and resources which are scattered in various domains. The Grid and its related technologies will be used only if the users and the providers mutually trust each other. The system must be as reliable and robust as of their own. The... Read More


A Novel Proxy Blind Signature Scheme for Mobile Devices

Daniyal M. Alghazzawi, Trigui Mohamed Salim, Syed Hamid Hasan

https://doi.org/

Abstract A proxy blind signature scheme is a special form of blind signature which allows a designated person called proxy signer to sign on behalf of two or more original signers without knowing the content of the message or document. It combines the advantages of proxy signature and blind signature scheme and satisfies the security properties of both proxy and blind... Read More


Immune-Inspired Algorithm for Network Intrusion Detection

Bennaoui Ameur, Hachemani Rabeh, Kouninef Belkacem

https://doi.org/

Abstract The central challenge with computer security is determining the difference between normal and potentially harmful activity. A promising solution is emerging in the form of Artificial Immune Systems (AIS). These include the theories regarding how the immune system responds to pathogenic material. This paper takes relatively new theory: the Danger theory and Dendritic cells, and explores the relevance of those... Read More


Scalar Quantization Based Robust Multiple Image Watermarking

Jaishree Rai,Suneeta Agarwal, Vijendra Rai

https://doi.org/

Abstract In the period of increasing data transfers, it is necessary to protect data so that there is compatibility and interoperability between the communications With respect to the general information hiding problem, a tradeoff is involved between robustness, visibility and capacity. There are many watermarking techniques for data hiding and each of them has some advantages and disadvantages. The robust method... Read More


Intrusion Detection in Wireless Ad Hoc Networks

Banshilal Patidar, Pinaki A.Ghosh

https://doi.org/

Abstract Intrusion detection has, over the last few years, assumed paramount importance within the broad realm of network security and it has significant impact on wireless ad hoc networks. These networks do not have an underlying infrastructure and the network topology constantly changes. The inherently vulnerable characteristics of wireless ad hoc networks make them susceptible to attacks, and it may be... Read More