Proficient Authentication Mechanism for Mobile and Pervasive Computing
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 8
Abstract
Mobile Computing is a technology that allows transmission of data, voice and video via a computer or any other wireless enabled device without having to be connected to a fixed physical link. With today’s technology, many applications rely on the existence of small devices that can exchange information and form communication networks. In a significant portion of such applications, the confidentiality and integrity of the communicated messages are of particular interest. In this work, we propose two novel techniques for authenticating short encrypted messages that are directed to meet the requirements of mobile and pervasive applications. By taking advantage of the fact that the message to be authenticated must also be encrypted, we propose provably secure authentication codes that are more efficient than any message authentication code in the literature. The key idea behind the proposed techniques is to utilize the security that the encryption algorithm can provide to design more efficient authentication mechanisms, as opposed to using standalone authentication primitives.
Authors and Affiliations
Kantamraju Anuhya| M.Tech (CSE), Usha Rama College of Engineering and Technology, A.P., India, G Syam Prasad| Head of the Department, Dept. of Computer Science & Engineering, Usha Rama College of Engineering and Technology, A.P., India
Wind Energy Conversion Systems using DFIG with Integrated Active Filter Capabilities
Doubly Fed Induction Generator for Wind Energy Conversion Systems manages the operation of doubly nourished acceptance generator with an incorporated dynamic channel capacities utilizing network side converter (GSC)....
Data Access In Disruption Tolerant Networks Using Cooperative Caching
Disruption tolerant networks (DTNs) consist of mobile devices that call each other opportunistically. Due to the low node density and impulsive no demobility, only broken network connectivity exists in DTNs, and the...
Controller Implementation for PV Interconnection Based ThreePhase UPS Systems Operating Under Highly Nonlinear Loads
This paper presents the design of a PV interconnection system based three-phase uninterruptible power supply (UPS) systems that are operating under highly nonlinear loads. The classical high-performance sinusoidal pu...
In the time of 21st century quick correspondence arrange, high application administrations like companion topeer (P2P) document sharing, video on request benefits, High Definition Multimedia Television (HDTV), 3DTV...
Privacy Preservation and traceability support using Public Auditing Mechanism
as future enhancement, we enhance the Oruta system in two interesting problems we will continue the study for our future work. One of them is traceability, which means the ability for the group manager (i.e., the ori...