Version-1 (Nov-Dec 2018)
- Citation
- Abstract
- Reference
- Full PDF
Abstract: When we are sending a secret information fromsource to destination over a wireless network, safe and secure transmission is a critical issue. An ad-hoc network is a set of wireless nodes and any type of central control or centralized administrationis not in this network. Wireless Ad-hoc networks are organized and configured in self mode. Each and every node in this network is set up using a wireless transmitter and a wireless receiver. The networktransmits data with other nodes in its communication range only. When the data are transmitted, the nodes communicate with each other usinga common physical media. The nodes send and receive signals using the same frequency band and by doing so, it follows the same hopping method. If the receiving node is not inside the transmission range.........
Keyword: Network Security, Plaintext, Cipher Text, Cryptology, Multi-level Encryption, Decryption
[1]. Here we have mentioned various references from which we actually collected our problem and Also found the solution for our
problem.
[2]. Kejun Liu, Jing Deng, Member, IEEE, Pramod K. Varshney, Fellow, IEEE, and Kashyap Balakrishnan, Member, IEEE
[3]. L. Buttyan and J.-P. Hubaux, "Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks," ACM/Kluwer Mobile
Networks and Applications, vol. 8, no. 5, 2003.
[4]. K. Balakrishnan is with the Security Services Group, Deloitte and Touche LLP, 1750 Tysons Boulevard, Suite 800, McLean, VA
22102. E-mail: kbalakrishnan@deloitte.com.
[5]. S. Marti, T. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," Proc. MobiCom, Aug.
2000..
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | Energy Consumption Algorithms on Green Computing Technology |
| Country | : | India |
| Authors | : | D. Jasmine Priskilla |
| : | 10.9790/0661-2006010608 ![]() |
Abstract: Green computing is the eco-friendly technology for the environmentally responsible of computers and their resources usage. Green computing is also defined as the way that reduces their environmental impact on study of designing, engineering, and manufacturing, using and disposing of computing devices.The data centre includes all the aspects of energy usage in an efficient manner from the IT equipment to the HVAC (Heating, ventilation and air conditioning) equipment of actual construction of the labs and offices.Green computing concept is introduced in 1992, by the Environmental Protection Agency (EPA) in the Energy Star Program. Many IT companies are trying to invent the energy-efficient computing devices for reducing the wastages and improving the recycle techniques in the creation of digital devices.Green Computing, additionally called green innovation, is the earth dependable utilization..........
Keywords–Green computing, computing energy conservation, energy efficiency data
[1]. "Best Practices Guide for Energy-Efficient Data Center Design", prepared by the National Renewable Energy Laboratory for the U.S. Department of Energy, Federal Energy Management Program, March 2011.
[2]. Alonso, Pedro, "Improving power efficiency of dense linear algebra algorithms on multi-core processors via slack control", IC on High Performance Computing and Simulation (HPCS), 2011,PP 463- 470.
[3]. Krongold, Brian Scott, "Computationally efficient optimal power allocation algorithms for multicarrier communication systems", Communications, IEEE Transactions on Jan 2000, pp 23-27.
[4]. Jianlizhuo and chaitalichakrabarti "Energy-Efficient Dynamic Task Scheduling Algorithms for DVS Systems", ACM Journal Name, Vol. V, No. N, Month 20YY, Pages 1– 22.
[5]. EPA: ENERGY STAR Program. Report to Congress on Server and Data Center Energy Efficiency. Technical report, United States Environmental Protection Agency (2007).
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | A Study On Diffie Hellman Algorithm And Elliptic Curve Cryptography |
| Country | : | India |
| Authors | : | S.Uma Mageshwari || Dr. R.Santhi |
| : | 10.9790/0661-2006010911 ![]() |
Abstract: Cryptography is the vast discipline to provide security at a greater level for our information. The Diffie Hellman (DH)Algorithm and Elliptic Currve Cryptography(ECC) are two different approaches to provide unique key. Using keys, data can be encryted( plaintext to ciphertext) and decrypted( ciphertext to original text).While transmitting data in a network, it should be safeguard from third party. The unique identification of key helps us to transmit data in a secured manner as well as an intruder not able to identify the key.The keys shows an important role in keeping the information confidential. This paper highlights the significance of keys , Diffie – Hellman algorithm with sample output and basics of Elliptic Curve Cryptography
Keywords–Diffie Hellman, ECC, Key.
[1]. Cryptography and Network Security – William Stallings, Fourth Edition, PHI,2006.
[2]. https://www.cryptomathic.com/news-events/blog/classification-of-cryptographic-keys-functions-and-properties.
[3]. https://security.stackexchange.com/questions/46802/what-is-the-difference-between-dhe-and-ecdh
[4]. Certicom,https://www.certicom.com/ecc
[5]. Elliptic Curve Cryptography: a gentle introduction, http://andrea.corbellini.name/2015/05/17/elliptic-curve-cryptography-a-gentle-introduction/
