Rajaram Ramasamy

Learn More
Yang-Wang-Chang proposed an improved timestamp associated password authentication scheme based on YangShieh, who had earlier proposed timestamp-based remote authentication scheme using smart cards. In this paper, we propose an efficient password authentication scheme with smart card applying RSA. The proposed scheme withstands most of the attacks with(More)
Rajaram Ramasamy*, Amutha Prabakar Muniyandi** * Thiagarajar College of Engineering, Madurai, Tamil Nadu 625 015, India E‐mail: rrajaram@tce.edu ** Smart and Secure Lab, Thiagarajar College of Engineering, Madurai, Tamil Nadu 625 015, India Abstract. Remote mutual authentication based on smart cards is the best practical solu‐ tion for remote accessing.(More)
Remote user authentication is a continual problem, particularly with mobile and handheld devices such as Personal Digital Assistants (PDAs), Smartcard, Laptops. Providing user authentication for safe access of precious, private information, or personalized services, for every system is difficult User authentication is the primary line of defence for a(More)
In this paper, we propose a new algorithm to detect and resolve distributed deadlocks in the generalized model. The initiator of the proposed algorithm diffuses the probes along the outgoing edges of Wait-For Graph (WFG) and collects the replies that carry the dependency information between processes directly. However, the initiator simplifies the(More)
Internet-based Mobile Ad Hoc Networking (MANET) is an emerging technology that supports self-organizing mobile networking infrastructures. This is expected to be of great use in commercial applications for the next generation internet users. A number of technical challenges are faced today due to the heterogeneous, dynamic nature of this hybrid MANET. A new(More)
Increasing with the number of users, the need for automatic classification techniques with good classification accuracy increases as search engines depend on previously classified web pages stored in classified directories to retrieve the relevant results. Preprocessing is the important step in web page classification problem as most of the web pages(More)
Most public key crypto systems use finite field modulo arithmetic. This modulo arithmetic is applied on real numbers, binary values and polynomial functions. The computation cost is based on how it works with minimum use of scarce resources like processor and memory We have implemented the determination of the multiplicative inverse of a polynomial over GF(More)
A hybrid Mobile AdHoc Network (MANET) is provided by gateways (GWs), which connect the MANET to the Internet. Hybrid MANETs are vulnerable to more security threats while routing through the gateways. To guarantee secure hence efficient data routing and transmission, In this paper, we propose to design a data aware secure gateway selection technique for(More)
  • 1