A. Kannammal

Learn More
Distributed Denial of Service (DDoS) attack launched in Cloud computing environment resulted in loss of sensitive information, Data corruption and even rarely lead to service shutdown. Entropy based DDoS mitigation approach analyzes the heuristic data and acts dynamically according to the traffic behavior to effectively segregate the characteristics of(More)
This paper proposes a novel technique to generate an irrevocable cryptographic key from the biometric template. The biometric trait considered here is the palm vein. The technique proposed here utilises the minutiae features extracted from the pattern generated. The features include bifurcation points and ending points. Since other cryptographic keys are(More)
This paper proposes the utilization of mobile agents to increase the performance in maintaining the consistency of web caches. Most popular browsers like Internet Explorer and Netscape are providing options to cache the frequently used web pages in the client sites itself in order to provide faster access to the clients and to reduce the network overhead(More)
The replica algorithms are built based on the topology of the data grid. The real representation of grid is general graph. So we propose an algorithm called Replica Placement in Graph Topology Grid (RPGTG) to place replicas on graph based data grids. In this paper, we address three issues concerning data replica placement in graph-based data grids. The(More)
This paper proposes a novel technique to generate an irrevocable cryptographic key from the biometric template and use it as a key to authenticate the smart card. The technique proposed here utilizes the minutiae features extracted from the pattern generated. The features include bifurcation points and ending points. Since other cryptographic keys are(More)
Routing in wireless ad hoc networks are vulnerable to traffic analysis, spoofing and denial of service attacks due to open wireless medium communications. Anonymity mechanisms in ad hoc networks are critical security measures used to mitigate these problems by concealing identification information, such as those of nodes, links, traffic flows, paths and(More)
A multiple, fragile image authentication scheme is proposed for DICOM images using discrete wavelet transform. This scheme addresses critical health information management issues, including source authentication, data authentication and transfer of patient diagnosis details. The robustness of the method is enhanced through a form of hybrid coding, which(More)