Now-a-days, organizations are becoming more and more dependent on their information systems due to the availability of high technology environment.Information is also treated as vital like other important assets of an organization. Thus, we require Information Security Services (ISS) protocols to protect this commodity. In this thesis, investigations have been made to protect information by developing some ISS protocols. We proposed a key management protocol, which stores one-way hash of the password at the server, instead of storing plaintext version of password.Every host and server agrees upon family of commutative one-way hash functions. Due to this prevention mechanism, online and offline guessing attacks are defeated. The protocol pro...
With the advancement in Internet-based technologies, network applications are no longer just limited...
Advanced information security aspects concern the protection and encryption of secure, strategic and...
Security of information systems has become a critical problem of companies. In this paper, the princ...
Frequent key changes are must in order to limit the amount of data compromised. Cryp-tography simply...
Today millions of ordinary citizens are using networks for banking, shopping and filing their tax re...
Security has become a buzzword over the current years. As per Wikipedia, 55.1% of global population ...
Communication Protocols form a fundamental backbone of our modern information networks. These protoc...
AbstractIn an open networking environment, a workstation usually needs to identify its legal users f...
This work modifies Shamir’s algorithm by sharing a random key that is used to lock up the secret dat...
Cryptography has a long and fascinating history. Over the centuries, an elaborate set of protocols a...
Abstract-A new security protocol for on- line- transaction can be designed using combination of both...
Internet today has become a vital part of day to day life, owing to the revolutionary changes it has...
Computer security is a field of computer science concerned with the control of risks related to comp...
As more services move on to the web and more people use the cloud for storage of important informati...
Graduation date: 2007Authentication protocols play important roles in network security. A variety of...
With the advancement in Internet-based technologies, network applications are no longer just limited...
Advanced information security aspects concern the protection and encryption of secure, strategic and...
Security of information systems has become a critical problem of companies. In this paper, the princ...
Frequent key changes are must in order to limit the amount of data compromised. Cryp-tography simply...
Today millions of ordinary citizens are using networks for banking, shopping and filing their tax re...
Security has become a buzzword over the current years. As per Wikipedia, 55.1% of global population ...
Communication Protocols form a fundamental backbone of our modern information networks. These protoc...
AbstractIn an open networking environment, a workstation usually needs to identify its legal users f...
This work modifies Shamir’s algorithm by sharing a random key that is used to lock up the secret dat...
Cryptography has a long and fascinating history. Over the centuries, an elaborate set of protocols a...
Abstract-A new security protocol for on- line- transaction can be designed using combination of both...
Internet today has become a vital part of day to day life, owing to the revolutionary changes it has...
Computer security is a field of computer science concerned with the control of risks related to comp...
As more services move on to the web and more people use the cloud for storage of important informati...
Graduation date: 2007Authentication protocols play important roles in network security. A variety of...
With the advancement in Internet-based technologies, network applications are no longer just limited...
Advanced information security aspects concern the protection and encryption of secure, strategic and...
Security of information systems has become a critical problem of companies. In this paper, the princ...