[PDF][PDF] Secure verification technique for defending IP spoofing attacks.

A Rengarajan, R Sugumar, C Jayakumar - Int. Arab J. Inf. Technol., 2016 - ccis2k.org
The Internet Protocol (IP) is the source of Internet transmission but an inadequate
authentication technique paves a way for IP spoofing. Since, IP spoofing initiates more …

ETAOSD: Static dictionary-based transformation method for text compression

FM Baloul, MH Abdullah… - 2013 INTERNATIONAL …, 2013 - ieeexplore.ieee.org
The aim of this paper is to present a new static dictionary-based algorithm for text
transformation to increase the data compression ratio when using standard compression …