Sheena, Mathew; Poulose Jacob,K(International Journal of Computer and Information Engineering, 2008)
[+]
[-]
Abstract:
Extensive use of the Internet coupled with the
marvelous growth in e-commerce and m-commerce has created a
huge demand for information security. The Secure Socket Layer
(SSL) protocol is the most widely used security protocol in the
Internet which meets this demand. It provides protection against
eaves droppings, tampering and forgery. The cryptographic
algorithms RC4 and HMAC have been in use for achieving security
services like confidentiality and authentication in the SSL. But recent
attacks against RC4 and HMAC have raised questions in the
confidence on these algorithms. Hence two novel cryptographic
algorithms MAJE4 and MACJER-320 have been proposed as
substitutes for them. The focus of this work is to demonstrate the
performance of these new algorithms and suggest them as dependable
alternatives to satisfy the need of security services in SSL. The
performance evaluation has been done by using practical
implementation method.
Poulose Jacob,K; Sheena, Mathew(International Journal of Computer, Information & Systems Science & Engineering, September 1, 2008)
[+]
[-]
Abstract:
Extensive use of the Internet coupled with the
marvelous growth in e-commerce and m-commerce has created a
huge demand for information security. The Secure Socket Layer
(SSL) protocol is the most widely used security protocol in the
Internet which meets this demand. It provides protection against
eaves droppings, tampering and forgery. The cryptographic
algorithms RC4 and HMAC have been in use for achieving security
services like confidentiality and authentication in the SSL. But recent
attacks against RC4 and HMAC have raised questions in the
confidence on these algorithms. Hence two novel cryptographic
algorithms MAJE4 and MACJER-320 have been proposed as
substitutes for them. The focus of this work is to demonstrate the
performance of these new algorithms and suggest them as dependable
alternatives to satisfy the need of security services in SSL. The
performance evaluation has been done by using practical
implementation method.
Description:
World Academy of Science, Engineering and Technology
Vol:2 2008-03-28
Poulose Jacob,K; Preetha Theresa, Joy(IEEE, February 16, 2014)
[+]
[-]
Abstract:
Cache look up is an integral part of cooperative
caching in ad hoc networks. In this paper, we discuss a
cooperative caching architecture with a distributed cache look up
protocol which relies on a virtual backbone for locating and
accessing data within a cooperate cache. Our proposal consists of
two phases: (i) formation of a virtual backbone and (ii) the cache
look up phase. The nodes in a Connected Dominating Set (CDS)
form the virtual backbone. The cache look up protocol makes use
of the nodes in the virtual backbone for effective data
dissemination and discovery. The idea in this scheme is to reduce
the number of nodes involved in cache look up process, by
constructing a CDS that contains a small number of nodes, still
having full coverage of the network. We evaluated the effect of
various parameter settings on the performance metrics such as
message overhead, cache hit ratio and average query delay.
Compared to the previous schemes the proposed scheme not only
reduces message overhead, but also improves the cache hit ratio
and reduces the average delay
Description:
Advanced Communication Technology (ICACT), 2014 16th International Conference on
Poulose Jacob,K; Santhosh, Simon(International Journal of Modern Engineering Research, 2012)
[+]
[-]
Abstract:
The evolution of wireless sensor network technology has enabled us to develop advanced systems for real time monitoring. In the present scenario wireless sensor networks are increasingly being used for precision agriculture. The advantages of using wireless sensor networks in agriculture are distributed data collection and monitoring, monitor and control of climate, irrigation and nutrient supply. Hence decreasing the cost of production and increasing the efficiency of production.This paper describes the application of wireless sensor network for crop monitoring in the paddy fields of kuttand, a region of Kerala, the southern state of India.
Description:
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.2, Issue.4, July-Aug 2012 pp-2017-2020