The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Chenab River is experiencing deteriorating water quality due to ill-planned industrialization, population pressure, extensive agriculture, water diversion and rapid urbanization. Our study was designed to highlight the spatiotemporal variation in the water quality of the Chenab and identify potential pollution sources using multivariate analyses viz cluster analysis, discriminant analysis, principal...
Like other developing countries (Brazil, Argentina, and India) compressed natural gas (CNG) is becoming a popular vehicular fuel in Pakistan. Rapid shifting of diesel and gasoline vehicles to CNG has brought Pakistan the highest number of CNG vehicles in the world. To quantify a possible decrease in vehicular emissions for different types of vehicles, engine and fuel types were monitored for five...
Signcryption was first proposed by Zheng and there after several signcryption schemes have been formulated. The broadcast scheme for Zheng does not offer non repudiation using public verification. A latest research by Elkamchouchi et. al proposed a new signcryption scheme for the broadcast environment. The scheme is known as Signcryption Multiple-Recipients Variant (SMRV). From the detail analysis...
Download accelerator plus (DAP) is one of the most popular download managers due to its free availability, download speed and versatility. This software records download activities across multiple files which include history, registry, RAM, swap and temporary files. This paper analyzes (a) the log files (with .DAT extension), (b) windows registry entries, and (c) RAM and swap files from forensic view...
Gossamer protocol has been recently published to achieve mutual authentication in low-cost RFID tags. This protocol is considered to fall in ultra-lightweight class as it incorporates simple and low cost operations. Most of the earlier proposals in this class were exposed soon after their publication. Common weaknesses included use of Triangular functions and improper use of logic operators. Gossamer...
Security of sensor network communication architecture relies on its routing scheme. This paper presents a secure routing scheme for heterogeneous sensor networks (HSNs). HSNs have proven to be more secure and scalable as compared to homogeneous sensor networks which are prone to routing attacks due to resource constraints. In our proposed scheme, routing tables are generated with multipath routing...
Despite the fact that RFID based ePassport (a.k.a biometric passport) has increased the efficiency of passport systems; it has created many new threats concerning personal data protection. Cryptographic tools are used to counter these threats but vulnerabilities are discovered in the implementation of these tools. For instance, basic access control (BAC) is used to thwart data skimming from the ePassport...
Key management is very critical to security protocols, as encryption and authentication services are based on the operations involving keys. In this paper, we propose a key management scheme based on random key pre-distribution for heterogeneous sensor network (HSN) to achieve better performance and security as compared to homogeneous network which suffer from high communication overhead, computation...
Sensor networks are expected to play an essential role in the upcoming age of pervasive computing. Due to their constraints in computation, memory, and power resources, their susceptibility to physical capture, and use of wireless communications, security is a challenge in these networks. The scale of deployment of wireless sensor networks requires careful decisions and trade-offs among various security...
Unlike block ciphers, stream ciphers do not have a standard model. A variety of structures are followed in stream cipher design. The stream cipher project of ECRYPT: eSTREAM aims to identify new stream ciphers that might become suitable for widespread adoption. 34 submissions are made in this on going project, based not only on conventional designs but also on some novel ideas. In this paper a comparative...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.