Asian Science Citation Index is committed to provide an authoritative, trusted and significant information by the coverage of the most important and influential journals to meet the needs of the global scientific community.  
ASCI Database
308-Lasani Town,
Sargodha Road,
Faisalabad, Pakistan
Fax: +92-41-8815544
Contact Via Web
Suggest a Journal
Articles by N. Nowsheen
Total Records ( 2 ) for N. Nowsheen
  R. H. Rahman , N. Nowsheen , M. A. Khan and A.H. Khan
  Finding the location of a mobile phone is one of the crucial challenges in modern telecommunication system. This study proposes a solution of locating a mobile phone on a city map using SMS (Short Message Service). This study intends to help mobile phone users to find out his/her location on a geographical map. The proposed method is GPS-free and it requires no additional technology to be added to existing mobile phones. It uses well-established algorithms to locate a mobile phone on a geographical map and then sends the position-on-a-map to the user mobile by an SMS.
  R.H. Rahman , N. Nowsheen , M.A. Khan and C.F. Ahmed
  In a distributed computer system and similar networks of computers it is necessary to have mechanisms by which various pairs of principals satisfy themselves mutually about each other`s identity-they should become sure that they really are talking to each other, rather than to an imposter impersonating the other agent. This is the role of an authentication protocol. Various authentication protocols based on public key and symmetric key cryptography have been developed for recent twenty or thirty years. Most of the symmetric key authentication schemes deployed today are based on principles introduced by Needham and Schroeder. In this study, we have proposed a symmetric key authentication scheme basically based on the Needham and Schroeder five-message protocol. The aim of our proposed method is to improve the existing Needham and Schroeder five message protocol in two aspects. One is to improve the time needed to distribute key between pair of nodes, i.e. making the key distribution process faster. And the second aspect is to develop on the weak security of the existing system.
Copyright   |   Desclaimer   |    Privacy Policy   |   Browsers   |   Accessibility