Sciweavers

CORR
2010
Springer
106views Education» more  CORR 2010»
13 years 11 months ago
A security framework for SOA applications in mobile environment
A Rapid evolution of mobile technologies has led to the development of more sophisticated mobile devices with better storage, processing and transmission power. These factors enab...
Johnneth de Sene Fonseca, Zair Abdelouahab, Deniva...
CORR
2010
Springer
133views Education» more  CORR 2010»
13 years 11 months ago
Performance evaluation of a new route optimization technique for mobile IP
Mobile ip (mip) is an internet protocol that allows mobile nodes to have continuous network connectivity to the internet without changing their ip addresses while moving to other ...
Moheb R. Girgis, Tarek M. Mahmoud, Youssef S. Takr...
CORR
2010
Springer
112views Education» more  CORR 2010»
13 years 11 months ago
Data security in mobile devices by geo locking
In this paper we present a way of hiding the data in mobile devices from being compromised. We use two level data hiding technique, where in its first level data is encrypted and ...
M. Prabu Kumar, K. Praneesh Kumar Yadav
CORR
2010
Springer
133views Education» more  CORR 2010»
13 years 11 months ago
PSIM: A tool for analysis of device pairing methods
Wireless networks are a common place nowadays and almost all of the modern devices support wireless communication in some form. These networks differ from more traditional computi...
Yasir Arfat Malkani, Lachhman Das Dhomeja
CORR
2010
Springer
212views Education» more  CORR 2010»
13 years 11 months ago
Cryptanalysis of a more efficient and secure dynamic id-based remote user authentication scheme
In 2004, Das, Saxena and Gulati proposed a dynamic ID-based remote user authentication scheme which has many advantage such as no verifier table, user freedom to choose and change...
Mohammed Aijaz Ahmed, D. Rajya Lakshmi, Sayed Abdu...
CORR
2010
Springer
188views Education» more  CORR 2010»
13 years 11 months ago
Agent Based Trust Management Model Based on Weight Value Model for Online Auctions
This paper is aimed at the stipulations which arise in the traditional online auctions as a result of various anomalies in the reputation and trust calculation mechanism. We try t...
E. Sathiyamoorthy, N. Ch. Sriman Narayana Iyengar,...
CORR
2010
Springer
114views Education» more  CORR 2010»
13 years 11 months ago
Integrating identity-based cryptography in IMS service authentication
Nowadays, the IP Multimedia Subsystem (IMS) is a promising research field. Many ongoing works related to the security and the performances of its employment are presented to the r...
Mohamed Abid, Songbo Song, Hassnaa Moustafa, Hossa...
CORR
2010
Springer
57views Education» more  CORR 2010»
13 years 11 months ago
Exact Ramsey Theory: Green-Tao numbers and SAT
Oliver Kullmann
CORR
2010
Springer
150views Education» more  CORR 2010»
13 years 11 months ago
On Generation of Firewall Log Status Reporter (SRr) Using Perl
Computer System Administration and Network Administration are few such areas where Practical Extraction Reporting Language (Perl) has robust utilization these days apart from Bioi...
Sugam Sharma, Hari Cohly, Tzusheng Pei
CORR
2010
Springer
124views Education» more  CORR 2010»
13 years 11 months ago
Quantum Three-Pass protocol: Key distribution using quantum superposition states
This letter proposes a novel key distribution protocol with no key exchange in advance, which is secure as the BB84 quantum key distribution protocol. Our protocol utilizes a phot...
Yoshito Kanamori, Seong-Moo Yoo