Volume 5 Number 2 June 2014

    
Biometric Authentication via Facial Recognition

Muhammad Umar Ibrahim, Mujahid Abbas

https://doi.org/

Abstract Security has become a vital need throughout the globe. An underdeveloped country Pakistan wants a reliable security system to prevent from the increasing threats of terrorism. A tool of artificial intelligence-biometric authentication can be a solution for such a problem. By implementing authentication system based on facial recognition in highly crucial areas of the country, the terror attacks can be... Read More


Fully Self Organized of Certificate Authority in MANETs

Ahmad Alomari

https://doi.org/

Abstract A mobile ad hoc network (known as MANET) represents a wireless communication network, without a preexistent subtraction or foundation and which is not reliant on any kind of centralized management. Various certificate authorities (CAs) distributed over the network, each with a periodically updated share of the secret key, is usually adopted. With this paper we hope to bring a strong... Read More


Novel Mutual Authentication Protocol for Cloud Computing using Secret Sharing and Steganography

Nimmy K, M. Sethumadhavan

https://doi.org/

Abstract Proper authentication is an essential technology for cloud-computing environments in which connections to external environments are common and risks are high. Here, a new scheme is proposed for mutual authentication where the user and cloud server can authenticate one another. The protocol is designed in such a way that it uses steganography as an additional encryption scheme. The scheme achieves... Read More