N. Radha

Learn More
Authentication of users is an essential and difficult to achieve in all systems. Shared secrets like Personal Identification Numbers (PIN) or Passwords and key devices such as Smart cards are not presently sufficient in few situations. The biometric improves the capability to recognize the persons. A biometric identification system is an automatic(More)
— With the extensive applications of fingerprint techniques in authentication systems, protecting the privacy of the fingerprint becomes an important issue. Traditional encryption is not sufficient for fingerprint privacy protection because decryption is required before the fingerprint matching, which exposes the fingerprint to the attacker. Therefore, in(More)
An analysis of the three dimensional flow of an viscous incompressible fluid between two horizontal porous flat plates separated by a finite distance in a slip flow regime is carried out under following conditions: the fluid is electrically conducting, the free stream velocity is uniform, the plate is subjected to a sinusoidal transverse suction velocity(More)
  • N Gomathy Mphil, N Radha, M Sc, Phd
  • 2014
— A distributed computer network is a special type of network, which facilitates the customers to use different network services which is provided by the service providers. In the distributed computer networks, user verification is an important process for the security. In the verification process, the decision is taken whether the user is legal or illegal(More)
  • N Gomathy Mphil, N Radha, M Sc, Phd
  • 2014
— The wireless and mobile communication systems have enormous growth in recent years because many people use mobile devices for acquiring different services like browsing, multimedia applications and file sharing etc. Mobile IPv6 (MIPv6) is probably the most extensively known IP mobility support protocol when compared to the Mobile IPv4. But in the Mobile(More)
  • J. Deeksha, N. Radha, U. Yedukondalu
  • 2013
To avoid accidents on highway roads, it is necessary to maintain safe distance between vehicles referred as " Inter-Vehicular Distance ". A warning system should be employed inside the vehicle, so that the vehicle could sense the distance between other vehicles by using GPS coordinates and ADHOC wireless network and then intimate it to the driver. The main(More)
The major concern of almost all the verification system is user authentication and security. This necessitates the development of a mechanism that ensures user security and privacy. A lot of research has been carried on this developing field and numerous techniques have been proposed earlier in literature. These traditional methods use tokens and passwords(More)
The increasing popularity of biometrics and cryptography is driven by the widespread stipulation on information security. Abundant efforts have been made in developing successful methods in these areas in order to accomplish an enhanced level of information security. There are two dominant issues in information security enhancement. One is to defend the(More)
  • 1