Learn More
— On a wired network, physical authentication is implicitly provided by access: if a user is able to plug a cable into a network socket, he must have cleared other security checks such as the receptionist and/or locked doors. In the case of a wireless local area network (WLAN), the signal propagation is not limited by a fixed boundary, and unauthorized(More)
On a wired network, physical authentication is implicitly provided by access: if a user is able to plug a cable into a network socket, he must have cleared other security checks such as the receptionist and/or locked doors. In the case of a wireless local area network (WLAN), the signal propagation is not limited by a fixed boundary, and unauthorized access(More)
D e p ar t m e nt of I nf or m a t i o n T e c hnol og y, De l hi T ec hn ol o gi c al U ni ve r s i t y E-Learning is the fastest and inexpensive source of information today. Thousands of the people today are using electronic gadgets for accessing E day is getting popularity because of its unlimited benefits. A person, sitting anywhere around the globe can(More)
The web was primarily made to be understood by human users. Semantic web, which was introduced in 2001 by Tim Berners-Lee [7], is an attempt to enable machines to understand or recognize information on the web. A lot of data on the World Wide Web is present in the form of databases and other structured data stores that can be converted to a form which is(More)
Accurate estimation of skew on I/O clocks is extremely critical when the part is expected to operate at a fixed frequency and any failure results in yield loss. Also, factors such as slow silicon, power saving modes, thermal throttling modes makes the data-path running on I/O clocks more critical as no timing relaxation is possible. The circuits on core(More)
Openness of wireless network makes it more sensible for various security attacks. Authentication is the most vital procedure to make sure that the service is appropriately used. It is a way of confirming the genuineness of a party by another party. There is a wide range of authentication schemes that varies according to time period. This paper, focus on the(More)
  • 1