CS Store Search
Displaying 1-9 out of 9 total
Low Complexity Multi-authority Attribute Based Encryption Scheme for Mobile Cloud Computing
2013 IEEE 7th International Symposium on Service Oriented System Engineering (SOSE)
By Fei Li,Yogachandran Rahulamathavan,Muttukrishnan Rajarajan,Raphael C.-W Phan
Issue Date:March 2013
In multi-authority attribute based encryption (MA-ABE) schemes, multiple authorities monitor different set of attributes and the corresponding shared-decryption-keys. In such schemes the encrypt or can encrypt a message and upload to the cloud, whereas onl...
Security Analysis of the Micro Transport Protocol with a Misbehaving Receiver
2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)
By Florian Adamsky,Syed Ali Khayam,Rudolf Jager,Muttukrishnan Rajarajan
Issue Date:October 2012
BitTorrent is the most widely used Peer-to-Peer (P2P) protocol and it comprises the largest share of traffic in Europe. To make BitTorrent more Internet Service Provider (ISP) friendly, BitTorrent Inc. invented the Micro Transport Protocol (uTP). It is bas...
Towards Secure Cloud Bursting, Brokerage and Aggregation
Web Services, European Conference on
By Srijith K. Nair, Sakshi Porwal, Theo Dimitrakos, Ana Juan Ferrer, Johan Tordsson, Tabassum Sharif, Craig Sheridan, Muttukrishnan Rajarajan, Afnan Ullah Khan
Issue Date:December 2010
The cloud based delivery model for IT resources is revolutionizing the IT industry. Despite the marketing hype around “the cloud”, the paradigm itself is in a critical transition state from the laboratories to mass market. Many technical and business aspec...
Healthcare Data Access Control Using XACML for Handheld Devices
Developments in eSystems Engineering, International Conference on
By Saritha Arunkumar, Muttukrishnan Rajarajan
Issue Date:September 2010
In the modern health services era, data is accessed by the doctors and nurses using small handheld devices like mobile, Personal Digital Assistants and other electronic handheld devices. Individual’s health related information is normally stored in a centr...
QoSiLAN - A Heterogeneous Approach to Quality of Service in Local Area Networks
Advances in Multimedia, International Conference on
By Christopher Köhnen, Christian Ãœberall, Veselin Rakocevic, Muttukrishnan Rajarajan, Rudolf Jäger
Issue Date:June 2010
Since most real-time audio and video applications lack Quality of Service (QoS) support and QoS-aware networkhardware is not common in consumer grade networks, theQuality of Experience (QoE) of, for example, high definitionInternet Protocol Television (IPT...
A Cycle-based Clustering Algorithm for Wireless Sensor Networks
Next Generation Mobile Applications, Services and Technologies, International Conference on
By Hassaan Khaliq Qureshi, Muttukrishnan Rajarajan, Veselin Rakocevic, Adnan Iqbal, Muhammad Saleem, Syed Ali Khayam
Issue Date:September 2009
In energy constrained wireless sensor networks, it is important that a routing protocol provides network redundancy and reliability at a minimum energy consumption cost. To satisfy these conflicting constraints, wireless sensor networks (WSN) routing proto...
Privacy-Preserving Multi-Class Support Vector Machine for Outsourcing the Data Classification in Cloud
IEEE Transactions on Dependable and Secure Computing
By Yogachandran Rahulamathavan,Raphael C.-W. Phan,Suresh Veluru,Kanapathippillai Cumanan,Muttukrishnan Rajarajan
Issue Date:December 2013
Emerging cloud computing infrastructure replaces traditional outsourcing techniques and provides flexible services to clients at different locations via Internet. This leads to the requirement for data classification to be performed by potentially untruste...
A novel framework for intrusion detection in cloud
Found in: Proceedings of the Fifth International Conference on Security of Information and Networks (SIN '12)
By Avi Patel, Bhavesh Borisanya, Chirag Modi, Dhiren Patel, Muttukrishnan Rajarajan
Issue Date:October 2012
One of the major security challenges in cloud computing is the detection and prevention of denial-of-service (DoS) attacks. In order to detect and prevent DoS attacks as well as other malicious activities at the network layer, we propose a framework which ...
Security framework for mobile banking
Found in: Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia (MoMM '10)
By Dasun Weerasinghe, Muttukrishnan Rajarajan, Veselin Rakocevic
Issue Date:November 2010
The banking sector is always looking for new services delivery platforms to improve customer confidence and satisfaction. To achieve this, the banking service delivery platform must provide end-to-end security to safeguard the information exchange between ...
Original Search Engine
Need a Web Account?
Become a Member
This site and all contents (unless otherwise noted) are Copyright ©2008, IEEE, Inc. All rights reserved.