Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CVSS Based Approach
Journal Title: International Research Journal of Computer Science - Year 2017, Vol 0, Issue 0
Abstract
This paper analysis vulnerability of known attacks on WLAN cipher suite, authentication mechanisms and credentials using common vulnerability scoring system (CVSS).
Authors and Affiliations
David Gitonga Mwathi, William Okelo-Odongo, Elisha Opiyo
A Novel Approach for Cryptography using Modified Substitution Cipher and Triangulation
In this paper a novel approach to encryption and decryption is presented, which will include two new techniques, namely, Rounded Cipher, a modified version of the substitution cipher, and Triangulation. This approach als...
Cloud Pricing - A Concern in Cloud Computing
Cloud computing is emerging as a promising field offering a variety of computing services to end users. These services are offered at different prices using various pricing schemes and techniques. End users will favor th...
A MECHANISM FOR PREVENTING DUPLICATE FILES IN CLOUD
cloud computing provides a way of storing a voluminous data and can be easily accessed anywhere. This work deals about the prevention of a duplicate file storage in cloud. Here there are three important components in our...
Angular Paging in Distance-based Location Registration in Mobile Communication
In this study, we proposed a new paging method, angular paging, that reduces the paging cost in distance based location registration (DBR). DBR causes a mobile station (MS) to register its location when the distance betw...
Exploring Regression Techniques for Predictions of Wheat and Rice Prices in India
Agriculture products play an important role in the economy of the country. In India, Wheat and Rice are the two major agriculture products and lots of economical decisions are taken by considering the prices of these agr...