Notice Board :

Call for Paper
Vol. 10 Issue 2

Submission Start Date:
Feb 01, 2018

Acceptence Notification Start:
Feb 22, 2018

Submission End:
Feb 25, 2018

Final MenuScript Due:
March 05, 2018

Publication Date:
March 10, 2018
                         Notice Board: Call for PaperVol. 10 Issue 2      Submission Start Date: Feb 01, 2018      Acceptence Notification Start: Feb 22, 2018      Submission End: Feb 25, 2018      Final MenuScript Due: March 05, 2018      Publication Date: March 10, 2018




Volume IV Issue III

Author Name
K A Ali
Year Of Publication
2012
Volume and Issue
Volume 4 Issue 3
Abstract
When drilling for data via SQL injection there are three classes of attack – inband, out-of-band and the relatively unknown inference attack. Inband attacks extract data over the same channel between the client and the web server; for example, results are embedded in a web page via a union select. Out-of-band attacks employ a different communications channel to drill for data by using database mail or HTTP functions for example. Inference attacks stand alone in the fact that no actual data is transferred – rather, a difference in the way an application behaves.
PaperID
2012/eusrm/04/03/1005

Author Name
E C Roa
Year Of Publication
2012
Volume and Issue
Volume 4 Issue 3
Abstract
This paper presents a compact interconnected double ring slot [1] antenna operating at 1.151 GHz and 2.766 GHz. The radiating elements of the proposed antenna are composed of a interconnected Double ring slot. The antenna size is very compact (48.51mm ×62.02mm × 1.6mm), and can be integrated easily with other RF front-end circuits. It is demonstrated that the proposed antenna is a dual band antenna with satisfactory radiation characteristics. The simulations are carried out using Zeland IE3D software
PaperID
2012/eusrm/04/03/1013

Author Name
A d l Oliva
Year Of Publication
2012
Volume and Issue
Volume 4 Issue 3
Abstract
— Digital Advertising are a newly emerging form of multimedia advertising technology that is rapidly growing in popularity but has received little attention in multimedia literature. In this paper we motivate the cost reduction and increased effectiveness of advertising that is displayed and managed using Digital IP Locator as opposed to traditional signage. As an example, we describe a method for customizing advertising messages for particular demographics in different locations using dynamically configurable. We describe a partially automated intermediary, namely the digital advertising, which forms a virtual marketplace for the purchase and sale of multimedia advertising on the digital. And also use click-to-call for local publisher for marketing there product.
PaperID
2012/eusrm/04/03/1022

Author Name
R Agüero
Year Of Publication
2012
Volume and Issue
Volume 4 Issue 3
Abstract
The weakness in SHA family is that two different inputs will produce the same output and it is important to have a good diffusion so that the output in each round will be spread out and not to be equal with the same output in the next coming stages. We present a hash algorithm that produces 192 bit message digest which generate larger bit difference in variable so that applications are preimage resistance and collision resistance. A modified expansion mechanism, shifting of variables and addition of variables, is used which provide an additional security against the differential attack.
PaperID
2012/eusrm/04/03/1030