Volume:
Season:
Year:
S. No. Title Page No.
#001

In order to attain resilient multipath routing we introduce the idea of Independent Directed Acyclic Graphs (IDAGs) on this study. Link-unbiased (Node-unbiased) DAGs fulfill the assets that any direction from a supply to the foundation on one DAG is hyperlink-disjoint (node-disjoint) with any direction from the supply to the foundation on the opposite DAG. Given a network, we expand polynomial time algorithms to compute hyperlink-unbiased and node-unbiased DAGs. The set of rules advanced on this paper: (1) affords multipath routing; (2) makes use of all viable edges; (3) ensures recuperation from unmarried hyperlink failure; and (4) achieves these kinds of with at maximum one bit in line with packet as overhead whilst routing is primarily based totally on vacation spot deal with and incoming edge. We display the effectiveness of the proposed IDAGs technique with the aid of using evaluating key overall performance indices to that of the unbiased timber and more than one pairs of unbiased timber strategies thru vast simulations.

#003

Three-party encrypted key (3pek) exchange protocol plays associate obligatory role in space of the secure communication during which 2 users will agree a standard session key supported an occasional entropy watchword. In 2002, a watchword documented key exchange protocol supported RSA projected by Zhu et al.. Later, associate undetectable password-guessing attacks has shown by Yeh et al. on this theme and additionally has given solutions for improvement. Recently, Yangtze and Yangtze projected a unique 3 party easy key exchange protocol. Later, associate Undetectable on-line watchword shot attack has shown on the higher than protocol by Yoon and Yoo. Recently, a watchword key exchange protocol PSRJ was projected and additionally claimed to be in-vulnerable to Undetectable on-line watchword shot attack projected by Yoon and Yoo..A detectable on-line watchword shot attack has shown on this theme and has given solutions for improvement by Archana et al. in 2012.Later another version of the 3pek exchange protocol victimisation parallel message Trasmission Technique has been projected and claimed to be vulnerable.In this paper, we have a tendency to review this protocol and analyze its hardiness for security.

Get In Touch

  • 19, Knowledge Park-II, Institutional Area, Greater Noida (UP), India Pincode-2013066
  • editor@njet.org

© 2022 NIET Journal Of Engineering & Technology (NIETJET). All Rights Reserved