Learn More
being developed using Scripting languages. PHP (ver. 5) and MySQL along with AJAX have been used extensively. Abstract:-Secure environments protect their resources against unauthorized access by enforcing access control mechanisms. So when increasing security is an issue text based passwords are not enough to counter such problems. The need for something(More)
The objective of this paper is to introduce theImproved-Ant Colony Optimization in VirtualCircuit Networks. We discuss AntNet, animproved version of Ant Colony applied as arouting protocol. A new model is proposed thatintroduces the application of Ant ColonyOptimization in the area of communicationnetwork. The proposed model is analyzed with theapplication(More)
Secure environments protect their resources against unauthorized access by enforcing access control mechanisms. So when increasing security is an issue text based passwords are not enough to counter such problems. This is where image based authentication (IBA) comes into play. IBA enhances the security level in an exceptionally user friendly way. This paper(More)
As communication is being done by electronic means in open air generally, security of data is highly desirable. One such technique of doing this is steganography. The requirement of a system that ensures increasing capacity, robustness and security of embedded data there have been so many variants in existing steganography technique. Due to this diversity(More)
  • W. Ciaurro, B. Major, +8 authors D. Zulaga
  • 2014
This paper focuses on data collection for keystroke biometric authentication studies. An experiment was performed on biometric keystroke characteristics of a person using a mobile device (nexus 5). Two types of input were collected-text and numeric entry from 10 different users. The purpose of the experiment was find ways to improve biometric security(More)
 Abstract—The paper gives an introduction to the public key cryptography and its use in applications such as Key Agreement, Data Encryption and Digital Signature. The main emphasize is on some public key algorithms such as RSA and ECC along with the idea how ECC is better and more secure method of encryption in comparison to RSA and other asymmetric(More)
  • 1