E: Network, Web & Security

E: Network, Web & Security (292)

GJCST: E

Security in Database Systems
Published In: GJCST Part: E: Network, Web & Security Volume: 12 Issue: 17
The paper focuses on security issues that are associated with the database system that are often used by many firms in their operations. The rapid development and proliferation of Information technology has offered many opportunities for integrated business operations. It has enabled business enhances their efficiency and effectiveness in operations such as customer care, sales, human re...
Paper Information
Authors Dr. Abdulrahman Hamed Almutairi, Abdulrahman Helal Alruwaili
Read Journal Click Here
Read Paper Click Here
Page No. 9 to 13

802.11 standards based WLAN is one very successful technology in commerce. Huge number of WLAN has been deployed across the world. It’s very worthwhile to investigate link characteristics of WLAN and its effects to upper layers, especially TCP protocol which is used by numerous network applications. The 802.11 standard is firstly introduced in this section. ...
Paper Information
Authors Dr. Gagandeep Singh Barar, Dr. G.N. Singh
Read Journal Click Here
Read Paper Click Here
Page No. 5 to 8

Predominantly large distributed networks currently provide support for group oriented protocols and applications. Regardless of the type of distributed network there is a need to provide communication privacy and data integrity to the information exchange amongst the group members. This paper introduces a protocol named Authentication based Secure Communication Plane (). adopts the commu...
Paper Information
Authors K S Jagadeesh, Dr. Somashekhar C Desai, Chandramouli.H, Kashyap D Dhruve
Read Journal Click Here
Read Paper Click Here
Page No. 67 to 74

Wireless sensor networks are composed of large numbers up to thousands of tiny radio- equipped sensors. Every sensor has a small microprocessor with enough power to allow the sensors to autonomously form networks through which sensor information is gathered. Wireless sensor networks makes it possible to monitor places like nuclear disaster areas or volcano craters without requiring human...
Paper Information
Authors Dr. Fazal Wahab Khattak
Read Journal Click Here
Read Paper Click Here
Page No. 57 to 65

Accelerated business growth has pushed telecommunication companies to implement knowledge management systems to systematically manage knowledge created within the organization. This helps them to retain their competitive edge in the rapid changing telecom sector. This study plan to explore the emerging role of Knowledge Management (KM) system in telecommunication industry. Moreover it al...
Paper Information
Authors Khalid AlRowaily,Dr. Abdulaziz O. Alsadhan
Read Journal Click Here
Read Paper Click Here
Page No. 31 to 42

Wireless Sensor Networks (WSNs) pose a new challenge to network designers in the area of developing better and secure routing protocols. Many sensor networks have mission-critical tasks, so it is clear that security needs to be taken into account at design time. However, sensor networks are not traditional computing devices, and as a result, existing security models and methods are ill s...
Paper Information
Authors Dr. Koffka Khan, Wayne Goodridge, Diana Ragbir
Read Journal Click Here
Read Paper Click Here
Page No. 43 to 49

The role of the Internet is increasing and many technical, commercial and business transactions are conducted by a multitude of users that use a set of specialized / sophisticated network applications. Today we face threats of the network which cause enormous damage to the community day by day to the Internet. In this context, the task of network monitoring and surveillance is of utmost ...
Paper Information
Authors Dr. Mukta Rao, Dr. Nipur
Read Journal Click Here
Read Paper Click Here
Page No. 51 to 56

Here in this paper a MAC layer level clogging detection system has been projected. The planned model aims to explores a system to compute the degree of clogging at victim node with maximal accuracy. This clogging detection apparatus is integrated with a Two-Step Cross Layer Clogging Control Routing Topology. The proposed model involves controlling of clogging in two steps with effective ...
Paper Information
Authors . M. Nagaraju, M.L.Ravichandra
Read Journal Click Here
Read Paper Click Here
Page No. 23 to 30

Security plays a vital role during the transmission of private data from one sender to the other. Although there are many security algorithms implemented but here we are providing the security algorithms on the RFID devices. The authentication techniques implemented in RFID is based on the new algorithm based on smart cards. The data send through the tags can be made secure using the pro...
Paper Information
Authors Dr. Vinita Sharma, Jitendra Kumar Gupta, K. K. Mishra
Read Journal Click Here
Read Paper Click Here
Page No. 17 to 22

Ad-hoc networks are basically self organizing and self configuring multi-hop mobile wireless network in which the information packets are transmitted in a store and forward manner from a source to an arbitrary destination via intermediate nodes. The main objective of this paper is to performance evaluation of AODV (Ad-hoc on demand distance vector) and DSDV (Destination sequence distance...
Paper Information
Authors Er. Abhishek Sengar, Er. Sandeep Shrivastav
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 6