A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Ganesan, R.
- Authentication Scheme for Multi-Server Environment
Authors
1 Adhiparasakthi Engineering College, IN
Source
Networking and Communication Engineering, Vol 3, No 12 (2011), Pagination: 771-775Abstract
Conventional authentication schemes allow a serviceable server to authenticate the legitimacy of a remote login user. However, these schemes are not used for multi-server architecture environments. This paper presents a secure and efficient remote user authentication scheme for multi-server environments.
This user authentication scheme is a pattern classification system based on an artificial neural network. In this scheme, the users only remember user identity and password to log in to various servers. Users can freely choose their password. Furthermore, the system is not required to maintain a verification table and can withstand the replay attack.
Keywords
Neural Network, Multi Server Architecture, User Authentication, Remote Login, Security.- A Nonblocking Token Ring Based Checkpointing Algorithm for Distributed Mobile Computing Systems
Authors
1 Department of Computer Science, Arignar Anna Government Arts College, Attur, Salem Dt. Tamil Nadu, IN
2 Department of MCA, K. S. Rangasamy College of Technology, Tiruchengode, Namakkal Dt, Tamil Nadu, IN
3 Department of MCA, K. S. Rangasamy College of Technology, Tiruchengode, Namakkal Dt, Tamil Nadu, IN
Source
Networking and Communication Engineering, Vol 1, No 4 (2009), Pagination: 143-147Abstract
Mobile computing introduces new flexibility such as continuous access to computing resources while the users travel.This facility raises new challenges such as fault tolerance in distributed mobile computing system. In this paper we present a non blocking token ring based checkpointing algorithm to tolerate the faults in the mobile computing environment. It is a single phase algorithm neither having the overhead of temporary checkpoints nor using dependency vector; and also it avoids the avalanche effect. Results shows that it outperforms two-phase algorithms.
Keywords
Checkpointing, Nonblocking and Token Ring.- A Secured Hybrid Architecture Model for Internet Banking (E-Banking)
Authors
1 Department of Computer Science, Coimbatore, IN
2 Govt. College of Technology, IN