3 resultados para Void

em Cochin University of Science


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Internet today has become a vital part of day to day life, owing to the revolutionary changes it has brought about in various fields. Dependence on the Internet as an information highway and knowledge bank is exponentially increasing so that a going back is beyond imagination. Transfer of critical information is also being carried out through the Internet. This widespread use of the Internet coupled with the tremendous growth in e-commerce and m-commerce has created a vital need for infonnation security.Internet has also become an active field of crackers and intruders. The whole development in this area can become null and void if fool-proof security of the data is not ensured without a chance of being adulterated. It is, hence a challenge before the professional community to develop systems to ensure security of the data sent through the Internet.Stream ciphers, hash functions and message authentication codes play vital roles in providing security services like confidentiality, integrity and authentication of the data sent through the Internet. There are several ·such popular and dependable techniques, which have been in use widely, for quite a long time. This long term exposure makes them vulnerable to successful or near successful attempts for attacks. Hence it is the need of the hour to develop new algorithms with better security.Hence studies were conducted on various types of algorithms being used in this area. Focus was given to identify the properties imparting security at this stage. By making use of a perception derived from these studies, new algorithms were designed. Performances of these algorithms were then studied followed by necessary modifications to yield an improved system consisting of a new stream cipher algorithm MAJE4, a new hash code JERIM- 320 and a new message authentication code MACJER-320. Detailed analysis and comparison with the existing popular schemes were also carried out to establish the security levels.The Secure Socket Layer (SSL) I Transport Layer Security (TLS) protocol is one of the most widely used security protocols in Internet. The cryptographic algorithms RC4 and HMAC have been in use for achieving security services like confidentiality and authentication in the SSL I TLS. But recent attacks on RC4 and HMAC have raised questions about the reliability of these algorithms. Hence MAJE4 and MACJER-320 have been proposed as substitutes for them. Detailed studies on the performance of these new algorithms were carried out; it has been observed that they are dependable alternatives.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Industrial pollutants, consisting of heavy metals, petroleum residues, petrochemicals, and a wide spectrum of pesticides, enter the marine environment on a massive scale and pose a very serious threat to all forms of aquatic life. Although, earlier, efforts were directed towards the identification of pollutants and their major sources, because of a growing apprehension about the potential harm that pesticides can inflict upon various aquatic fauna and flora, research on fundamental and applied aspects of pesticides in the aquatic environment has mushroomed to a point where it has become difficult to even keep track of the current advances and developments. The Cochin Estuarine System (CES), adjoining the Greater Cochin area, receives considerable amounts of domestic sewage, urban wastes, agricultural runoff as well as effluent from the industrial units spread all along its shores. Since preliminary investigations revealed that the most prominent of organic pollutants discharged to these estuarine waters were the pesticides, the present study was designed to analyse the temporal and spatial distribution profile of some of the more toxic, persistent pesticides ——— organochlorines such as DDT and their metabolites; HCH-isomers; a cyclodiene compound," Endosulfan and a widely distributed, easily degradable, organophosphorus compound, Malathion, besides investigating their sorptional and toxicological characteristics. Although, there were indications of widespread contamination of various regions of the CBS with DDT, HCH-isomers etc., due to inadequacies of the monitoring programmes and due to a glaring void of baseline data the causative factors could not identified authentically. Therefore, seasonal and spatial distributions of some of the more commonly used pesticides in the CES were monitored systematically, (employing Gas Chromatographic techniques) and the results are analysed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

“At resale stores I have seen brand new clothes with original price tag still hanging from the sleeve. Some children have so many toys that they stay frustrated, not knowing which one to pick up for their next amusement. Presumably sensible adults trade in perfectly good cars just to have something shinier and newer. Didn’t us once live productive normal lives, without all these gadgets” [Cunningham (2005)]. During late eighties, nearly forty four percent of the participants, who took part in a consumer survey conducted in the US, responded positively to the question “My closets are filled with still 2 unopened items” [Faber and O’Guinn (1988)]. Reading such excerpts does not greatly surprise us anymore; as such reports have become common now. For many people shopping has moved beyond something that caters to their needs and wants and has become a hobby [Cunningham (2005)], an activity that they engage in to satisfy their hedonistic or pleasure-seeking goals [Ramnathan and Menon(2006), O’Cass and McEween (2004), Faber and O’Guinn (1989)]. Others look at their new possession as something that fills a void in their lives [Belk (1985), Diener et al. (1993)].