Jayanti Dansana

Learn More
The growing threat of cyber attacks, especially the DDoS (Distributed Denial of Service Attack) makes the IP Traceback very much prevalent to today's Internet security. IP Traceback is one of the security concerns that is associated with finding out the true origin of the attack/attacker. This process is very cumbersome as the IP addresses in most cases are(More)
— Data mining technology has emerged as a means of identifying patterns and trends from large quantities of data. Mining association rule is important data mining problem. Association rule mining algorithms are used to discover important knowledge from databases. Privacy concept occurs when the data is distributed in environment and association rule also(More)
—In this modern era, biometrics incorporate various mechanisms to recognize inimitable features of human beings by utilizing their biological and evident features. This paper proposes a novel technique for constructing a resilient and secure biometric recognition system. In this paper, an ECG-hash code of two distinct individuals has been formed by taking(More)
The information age has enabled many organizations to gather huge volumes of data. A scenario in which two parties owning confidential databases wish to run a data mining algorithm on the union of their databases, without illuminating any unnecessary information requires the protection of the privileged information. The aim of a classification problem is to(More)
  • 1