E: Network, Web & Security

E: Network, Web & Security (292)

GJCST: E

Tate Pairings on Elliptic curve Cryptography are important because they can be used to build efficient Identity-Based Cryptosystems, as well as their implementation essentially determines the efficiency of cryptosystems. In this work, we propose an identity-based encryption based on Tate Pairing on an elliptic curve. The scheme was chosen ciphertext security in the random oracle model as...
Paper Information
Authors Ramesh Ch, K Venugopal Rao, D Vasumathi
Read Journal Click Here
Read Paper Click Here
Page No. 31 to 35

Decades onwards companies are creating massive data warehouses to store the collected resources. Even though the stored resources are available, only few companies have been able to know that the actual value stored in the database. Procedure used to extract those values is known as data mining. We use so-many technologies to apply this data-mining technique, artificial neural network(AN...
Paper Information
Authors D. Rajeswara Rao, Dr. JVR Murthy
Read Journal Click Here
Read Paper Click Here
Page No. 23 to 30

The diagnosis of heart disease at the early time is important to save the life of people as it is absolutely annoying process which requires extent knowledge and rich experience. By and large the expectation of heart infections in conventional method for inspecting reports, for example, Electrocardiogram-ECG, Magnetic Resonance Imaging- MRI, Blood Pressure-BP, Stress tests by medicinal p...
Paper Information
Authors D. Rajeswara Rao, Dr. JVR Murthy
Read Journal Click Here
Read Paper Click Here
Page No. 11 to 16

Abstract: malicious software also known as malware are the critical security threat experienced by the current ear of internet and computer system users. The malwares can morph to access or control the system level operations in multiple dimensions. The traditional malware detection strategies detects by signatures, which are not capable to notify the unknown malwares. The machine learni...
Paper Information
Authors G. Bala Krishna, V. Radha, K. Venugopala Rao
Read Journal Click Here
Read Paper Click Here
Page No. 17 to 22

Cryptography is the background of protecting the flowed information between various communicated parties. Quantum cryptography gives the extreme trust to transferred information by creating a unique secret key that is based upon the law of physics. This paper will discuss a novel algorithm that is presented through quantum key distribution (QKD) protocol. This QKD protocol depends on par...
Paper Information
Authors Abdulbast Abushgra, Khaled Elleithy
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 4

Wireless local area network (WLAN) provides robust high quality service at a low cost and is a an essential part of everyday web browsing, file exchange, texting, e-mailing and to access live audio/video streams at homes, in public places such parks and airports, and in private places such as offices, enterprise environments, retail stores, and hotels. The adoption of the technology is a...
Paper Information
Authors Macha Sarada, Dr. Avula Damodaram
Read Journal Click Here
Read Paper Click Here
Page No. 41 to 47

Computer systems and their interconnections using networks have im-proved the dependence of both the organizations as well as the individuals on the stored information. This interconnection, in turn, has led to a heightened awareness of the need for data security and the protection of data and re- sources from electronic frauds, electronic eavesdropping, and networkbased attacks. Consequ...
Paper Information
Authors Narendra Panwar
Read Journal Click Here
Read Paper Click Here
Page No. 25 to 33

The Mobile Ad hoc Networks playing critical role in network aided communication requirements. The features such as ad hoc and open architecture based connectivity and node mobility are elevating the mobile ad hoc networks as much as feasible to deploy and use. The direct communication between any of two nodes in this network is possible if target node is in the range of source node. If n...
Paper Information
Authors SK. Nagula Meera, D. Srinivasa Kumar, D. Srinivasa Rao
Read Journal Click Here
Read Paper Click Here
Page No. 35 to 40

This paper studies the challenges in the current intrusion detection system and comparatively analyzes the active and passive response systems. The paper studies the existing IDS and their usefulness in detecting and preventing attacks in any type of network and control traffic with the performance of the system to be improved. The study also evaluates the emerging avenues in Intrusion D...
Paper Information
Authors Vivek Kumar, Gagan Deep Sharma
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 10

The delivery of education has improved over time by using the IT enabled services, especially in the higher education institutes. The role of the IT enabled services to disseminate effective teaching has increased over time and still improving with a great pace with emerging needs of the students and the teachers. This research paper is focused to identify and investigate the quality of ...
Paper Information
Authors Romana Aziz, Basit Shahzad
Read Journal Click Here
Read Paper Click Here
Page No. 15 to 24