Yashaswi Singh

Learn More
The end of this decade is marked by a paradigm shift of the industrial information technology towards a pay-per-use service business model known as cloud computing. Cloud data storage redefines the security issues targeted on customer's outsourced data (data that is not stored/retrieved from the costumers own servers). In this work we observed that, from a(More)
—Wireless mesh network (WMN) is a rapid deployed, self organized and multi-hop wireless networks. The wireless and distributed natures of WMNs make them subject to various kinds of attacks, which raise a great challenge in securing these networks. Most existing security mechanisms are based on cryptographic keys where a high degree key management services(More)
—Interference has been proven to have an effect on the performance in wireless mesh networks (WMN). Using multi-channels can improve the performance of WMNs by reducing interference influence. In this paper, we study how to design a robust WMN for a set of mesh nodes, each with Q Networking Interface Cards (NICs) and pre-defined connection requests. Our(More)
The growth of laptops, personal digital assistant (PDA) and 802.11/Wi-Fi wireless networking have made mobile ad-hoc network (MANET) and machine-to-machine (M2M) popular research topics recently. With more attention on M2M and MANETs lately, the security issues become more important and urgent for managing and deploying in such networks. The flexible(More)
Cloud computing is an emerging field which is raising its importance in the field of storage of data. Every individual, firm or organization wants to store data that has the limited storage capacity. For that purpose, there is need to outsource data to some Cloud Service Provider, there arises a problem of security of data. Security comes with 3 main(More)
— Wireless mesh network (WMN) is a rapid deployed , self organized and multi-hop wireless networks. However, the wireless and distributed natures of WMN make it subject to various kinds of malicious attacks, which raise a great challenge in securing these networks. Most existing security mechanisms are based on cryptographic keys where a high degree key(More)
The effects of TMB-8 [8-(N.N.-diethylamino)octyl-3,4,5-trimethoxybenzoate], a putative calcium antagonist, on directly and indirectly evoked isometric twitches, tetanic contractions and potassium- and caffeine-induced contractures, were investigated in the mouse isolated phrenic nerve-hemidiaphragm preparation. In the lowest concentration tested (10(-6) M),(More)
  • 1