Browse Conferences
Differential cryptanalysis of Substitution Permutation network
Differential cryptanalysis observes the effect of differences of input pairs of a cipher on the differences of its resultant output pairs. The difference of two cipher text is expressed as function of their corresponding plain text differen...
A group-based authentication scheme for vehicular Moving Networks
Uninterrupted mobile connectivity in fast moving public transportation systems like bus and train is difficult to achieve. Frequent handovers and security procedures for a large number of mobile users travelling together in these mass trans...
DoS attacks prevention using IDS and data mining
Denial of Service (DoS) attacks pose a serious threat to business companies. DoS attacks is hard to defend because of many different ways that hacker may strike. DoS attacks focus on certain applications. DoS attack targets to make the serv...
Malware detection vectors and analysis techniques: A brief survey
Over the last decade, a war has been taking place which involves the computer security community and the black hat hackers. The security community uses every possible routine and strategies in order to cease and also to remove the damage ca...
Hyperspectral image analysis using neighborhood rough set and mathematical morphology
Classification of hyperspectral remote sensing images is a challenging task because of its high dimensionality. In this paper, a two stepped method for classification of hyperspectral images is presented. The first step performs band select...
Fusion of projected feature for classification of EMG patterns
In medical domain, proper set of information fusion is the vital requirement for quantitative interpretation. In this paper, we present a novel feature fusion technique based on two-fold feature projection (FP) for EMG classification. Canon...
Signal type detection in CRN: A hierarchical modulation classification framework using SVM and Decision tree approaches
To ensure effective dynamic spectrum access in cognitive radio proper signal classification in fading channels and low signal to noise ratio environment is essential. Due to lack of information about the modulation scheme used it cannot dis...
A survey on feature remeshing of 3D triangular boundary meshes
Remeshing is an important technique used for the improvement of the quality of 3D models. The original features of a particular mesh may distort or change while using certain remeshing techniques. This may impact further processing on the m...
Survey and analysis of Modern Authentication system
Modern Authentication system ensures that only the entrusted entities should communicate and ensures that unauthorized user which is trying to establish some connection in order to gain login to the system by impersonating his identity shou...
A computationally light scheme for enhanced privacy in LTE
In the authentication and key agreement protocol adopted in LTE, pseudonyms are employed for identity presentation, so that the real identity of the subscriber remains confidential. However, there are occasions where pseudonyms may fail to ...