Work place: Hindustan Institute of Technology and Management, Agra Uttar Pradesh Technical University, Lucknow, India
E-mail: darpan.anand.agra@gmail.com
Website:
Research Interests: Distributed Computing, Network Security, Network Architecture, Computer Architecture and Organization, Computer systems and computational processes
Biography
Darpan Anand is working as Assistant Professor in the Department of Computer Science and Dean (Student Welfare) at Hindustan Institute Technology & Management, Agra. His research interest includes Network Security, Cryptography, Computer Network and Distributed Computing.
By Shivangi Saxena Darpan Anand
DOI: https://doi.org/10.5815/ijcnis.2017.01.02, Pub. Date: 8 Jan. 2017
Digital Signature protects the document`s integrity and binds the authenticity of the user who have signed. Present Digital Signature algorithm confirms authenticity but it does not ensure secrecy of the data. Techniques like encryption and decryption are needed to be used for this purpose. Biometric security has been a useful way for authentication and security as it provides a unique identity of the user. In this paper we have discussed the user authentication process and development of digital signatures. Authentication was based on hash functions which uses biometric features. Hash codes are being used to maintain the integrity of the document which is digitally signed. For security purpose, Encryption and Decryption techniques are used to develop a bio -cryptosystem. User information when gets concatenated with feature vector of biometric data, which actually justifies the sense of authentication. Various online or offline transaction where authenticity and integrity is the top most priority can make use of this development.
[...] Read more.By Shanu Gaharana Darpan Anand
DOI: https://doi.org/10.5815/ijcnis.2016.10.06, Pub. Date: 8 Oct. 2016
Internet and Communication Technologies operates widely in a multi-server environment. Authentication is one of a primary concern in multi-server environment. There are so many remote user authentication schemes using smart cards that operate in multi-server environment. But there are some authentication bottlenecks that these schemes suffer from. We have analyzed some schemes on the grounds of some specific security requirements and goals. In this paper, we propose a scheme that integrates key exchange and session key agreement in one phase and also supports traceability feature and resists denial of service attack.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals