Bhushan Sonawane

Learn More
offers finer-grain location authentication than do cellular telephones. Furthermore, the power grid is deployed widely and is highly reliable, even in many places where cellular telephone and GPS signals are obstructed or unavailable. We present our architecture and Power line Location Authentication Protocol (PLAP) in sufficient detail to permit further(More)
We present and experimentally evaluate Spread Identity (SI)—a new dynamic network address remapping mechanism that provides anonymity and DDoS defense capabilities for Internet communications. For each session between a source and destination host, the trusted source gateway dynamically and randomly assigns an IP address for the source host from the pool of(More)
Three-dimensional porous structures using biodegradable materials with excellent biocompatibility are critically important for tissue engineering applications. We present a multi-nozzle-based versatile deposition approach to flexibly construct porous tissue engineering scaffolds using distinct polymeric biomaterials such as thermoplastic and(More)
Assignment problem in content distribution networks (CDN) is unsplittable hard-capacitated facility location problem (UHCFLP) because of underlying anycast routing protocol. We extend assignment problem in CDN to multidimensional facility location problem (MFLP). With our devised algorithm, assignment cost considers CPU utilization parameter along with(More)
The Internet is rapidly being adopted as the dominant communication medium, as evidenced by the recent explosive growth of companies and services that integrate the traditional telephone service simply as a type of data-service over the Internet (viz., Voice-over-IP). Continuous and ubiquitous availability of Internet services is therefore increasingly(More)
In this paper we are describing how the secure communication can be achieved by using LDPC and stopping sets in data transmission process. It Emphasizes that the LDPC encoder and Stopping sets are been used for encrypting and decrypting the message respectively. By using this technique we achieved error free and secure communication. It also prevent the(More)
We introduce Markov Model for Web services attacks detection and mitigation. This model is capable of preventing not only injection attacks like SQL injection, Cross-Site Script-ing (XSS), buffer overflow but also detect abnormal Web service client behavior. We adopted the well known technique based on Markov model for detecting Web application attacks. Our(More)
Title of Thesis: Spread Identity: A New Dynamic Address Remapping Mechanism for Anonymity and DDoS Defense. We present and experimentally evaluate spread identity — a new dynamic network address remapping mechanism for Internet connections that provides anonymity and DDoS defense. For each session between a source and destination host, the trusted source(More)
This article may be used for research, teaching, and private study purposes. Any substantial or systematic reproduction, redistribution, reselling, loan, sub-licensing, systematic supply, or distribution in any form to anyone is expressly forbidden. The publisher does not give any warranty express or implied or make any representation that the contents will(More)
  • 1