Refine your search
Collections
Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Rajendran, T.
- An Improved Method for XML and Encryption
Abstract Views :174 |
PDF Views:3
Authors
Affiliations
1 Department of Computer Science & Engineering, SNS College of Technology, Coimbatore, Tamilnadu, IN
2 Department of Computer Science and Engineering at Kongu Engineering College, affiliated to Anna University, Coimbatore, Tamilnadu, IN
3 Anna University, Coimbatore, Tamilnadu, IN
1 Department of Computer Science & Engineering, SNS College of Technology, Coimbatore, Tamilnadu, IN
2 Department of Computer Science and Engineering at Kongu Engineering College, affiliated to Anna University, Coimbatore, Tamilnadu, IN
3 Anna University, Coimbatore, Tamilnadu, IN
Source
Wireless Communication, Vol 3, No 1 (2011), Pagination: 51-58Abstract
In the early days cards have entered our global community. Although initially they were only used as simple phone cards they now support a large number of applications. This paper will mainly explain the Smart card architecture .This paper explains the algorithm used for this and also it explains the SOAP protocol used for the transmission of it. This paper mainly aimed at security and also used for the security purpose. Finally conclude that this technique is better for the transmission of the data.Keywords
Cards, Attacks, Security, Encryption, SOAP Protocol.- An Overview of Strategy Based Approaches in Combating Intrusion and Threats
Abstract Views :157 |
PDF Views:3
Authors
Affiliations
1 S N S College of Technology, Coimbatore, IN
2 Computer Science Department, Angel College of Engineering and Technology, Tirupur, IN
3 Computer Science Department, S N S College of Technology, Coimbatore, IN
1 S N S College of Technology, Coimbatore, IN
2 Computer Science Department, Angel College of Engineering and Technology, Tirupur, IN
3 Computer Science Department, S N S College of Technology, Coimbatore, IN
Source
Networking and Communication Engineering, Vol 3, No 1 (2011), Pagination: 31-40Abstract
Recently the competitiveness of any Security product is determined by the efficiency to deal with spy ware and to manage any given threat from detection to full removal. Detecting and removing installed and active threats presents many challenges, particularly where multiple files, processes and registry components are involved. The ability for these components to be updated from the Internet at any time and with varying frequency only complicates the issue further. In some cases the threats can be removed in safe mode only, but the Antivirus products are normally inactive in safe mode, this is a major challenge for the Security products. Some ischolar_main kits affects the host files which makes website redirection issues and finally make the Antivirus product out of phase. This paper looks at how organizations and users can benefit from a more integrated, strategy-driven approach to protecting the network at all levels and controlling both user access and behavior by combating modern threats. This paper also describes about the recent infections like ischolar_main kits which cannot be automatically removed by the Antivirus products and some of the manual removal techniques used for those infections and the general locations where the threats gets affected. Intrusion Detection System (IDS) has been used to secure these environments for sharing their data over network and host based IDS approaches. The rapid improvements of intrusions in internet and other networks are the main factors responsible for the propagation of different threats and vulnerabilities in the computing environment. Now a days the Ids makes use of the signature based detection approach which detects the actions based on analyzing the patterns such as text, password, time etc. So this will create difficulties in updating information and detecting unknown attacks. In this paper we make use of an improved EADS (Exception Agent Detection System) for making the header information secure.. We establish the conditions under which the IDPF framework works correctly in that it does not discard packets with valid source addresses. In this paper we also propose an improved behavioral method for combating the unknown threats other that the usual context and content scanning techniques.Keywords
Threats, Antivirus, Malware, Security Guard, Spam.- Zigbee Based Wireless Home Security and Automation System
Abstract Views :179 |
PDF Views:3
Authors
Affiliations
1 SNS College of Technology, Coimbatore, Tamilnadu, IN
2 Department of CSE in SNS College of Technology, Coimbatore, Tamilnadu, IN
1 SNS College of Technology, Coimbatore, Tamilnadu, IN
2 Department of CSE in SNS College of Technology, Coimbatore, Tamilnadu, IN