Anjani Kumar Rai

Learn More
Nowadays log file plays vital role in web forensic as digital evidence. Hence security of log file is a major topic of apprehension. In this paper a model of image logging server having alteration detectable capability, is proposed. According to this approach we first convert a text log file into image log file with the help of bit encoding technique and(More)
IEEE 802.16e supports EAP (Extensible Authentication Protocol) for authentication, but do not specify the EAP method required for authentication. EAP-SPEKE and EAP-SRP are the strongest password based EAP methods. This paper examines these EAP methods and proposes an efficient password based authentication protocol for WiMAX. Proposed protocol is an(More)
  • 1