Papers by Dhanashree Toradmalle

International Journal of Recent Technology and Engineering (IJRTE), 2019
In the digital world today, data is growing tremendously. The onus lies on the network to compute... more In the digital world today, data is growing tremendously. The onus lies on the network to compute, process, transfer and store this data. There is a direct proportional relationship between the size of data to the efficiency of a given system. The major challenge that systems face today is the size of data thereby the vision of these systems is to compress the data to its maximum so that the storage space, processing time is reduced thereby making the system effective. As DC ideas result to viable usage of accessible storage space and effective transfer speed, various methodologies were created in a few angles. An itemized overview on many existing DC strategies is expressed to address the present necessities in lieu of the information quality, coding plans and applications in request to break down how DC strategies and its applications have advanced a similar investigation is performed to recognize the commitment of inspected procedures as far as their qualities, fundamental ideas,...
Rockyou
Passwords that were leaked or stolen from sites. The RockyouDataset is about 14 million passwords.
Advanced Toolkit For On Demand ADHOC Routing is a toolkit which can used to enhance existing tool... more Advanced Toolkit For On Demand ADHOC Routing is a toolkit which can used to enhance existing toolkits available for on demand routing protocols. The existing toolkits aid us with a virtual look and feel of working of the routing protocol. However the existing toolkits do not provide a platform for a better in depth understanding of existing protocol. We thereby intend to provide a more visionary approach to user for better understanding and development of wireless ADHOC routing protocol. This can be done by generating a TCL script. The generated TCL script will help user to understand the code in a better way by executing the same in NS2 simulator. INDEX TERMS: DSR(Dynamic Source Routing), AODV(ADHOC On-Demand Distance Vector), TCL(Tool Command Language), NS2(Network Simulator Version2).
International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2020
Music Album Management System is a fully functional, flexible and convenient application and a us... more Music Album Management System is a fully functional, flexible and convenient application and a user friendly interface which provides a good experience. This paper describes the phases of the design and development and emphasizes the system's functionality.
Modeling Human Tendencies for Password Guessing
ICT Systems and Sustainability, 2022

Blockchain-Based Crowdfunding: A Trust Building Model
2021 International Conference on Artificial Intelligence and Machine Vision (AIMV), 2021
Blockchain-based crowdfunding is one of the new, upcoming alternatives to the traditional central... more Blockchain-based crowdfunding is one of the new, upcoming alternatives to the traditional centralized approach to crowdfunding. Traditional crowdfunding platforms are vulnerable to data leaks, high transaction and platform fees, and rampant frauds which happens due to the anonymity of user’s identity i.e., users cannot be identified when they commit cybercrimes. As blockchain is immutable and decentralized, it can reduce the possibility of data breaches. This brings in transparency as there is no central authority over the blockchain-based crowdfunding system. This paper attempts to solve these existing issues with the aid of a digital identity management system with an underlying Blockchain system. By implementing blockchain in a digital identity management system, malicious users can be identified and action can be taken against them. This paper explores donation-based crowdfunding using Ethereum as a framework and has been tested on the Rinkeby Test Network. This system can conduct several crowdfunding campaigns simultaneously. This paper explains the smart contract written in Solidity language in detail.

Implementation of ECC and ECDSA for Image Security
the use of digital data has been increase over the past decade which has led to the evolution of ... more the use of digital data has been increase over the past decade which has led to the evolution of digital world. With this evolution the use of data such as text, images and other multimedia for communication purpose over network needs to be secured during transmission. Images been the most extensively used digital data throughout the world, there is a need for the security of images, so that the confidentiality, integrity and availability of the data is maintained. There is various cryptography techniques used for image security of which the asymmetric cryptography is most extensively used for securing data transmission. This paper discusses about Elliptic Curve Cryptography an asymmetric public key cryptography method for image transmission. With security it is also crucial to address the computational aspects of the cryptography methods used for securing images. The paper proposes an Image encryption and decryption method using ECC. Integrity of image transmission is achieved by u...

International Journal of Advanced engineering, Management and Science, 2016
An Ad hoc network in a wireless system consist of an autonomous system, without centralization wh... more An Ad hoc network in a wireless system consist of an autonomous system, without centralization which results forming of mobile nodes. In MANET, each node works in a dual form that consists of a router as well as hosts. These nodes configure dynamically and communicate using hop to hop. Due to its simplicity it is used in mobile conferencing, military communication. In MANET nodes can join and leave the network so MANET becomes vulnerable. Certain factors like dynamic network configures, distribution cooperation, open medium terrorized in routing which give rise to security issues. Once such protocol AODV has been a victim of security. In existing, MANET faces a severe problem known as the Black Hole problem. This Black hole problem is mostly found in reactive routing protocol called AODV.The black hole conducts its Malicious node during route discovery process. Black hole node is a severe threat in AODV protocol that easily employed and becomes vulnerable in MANET. In this paper var...

1Dept. of Information Technology, Shah & Anchor Kutchhi Engineering College, Mumbai (M.S.), India... more 1Dept. of Information Technology, Shah & Anchor Kutchhi Engineering College, Mumbai (M.S.), India 2Dept. of Information Technology, Shah & Anchor Kutchhi Engineering College, Mumbai (M.S.), India 3Dept. of Information Technology, Shah & Anchor Kutchhi Engineering College, Mumbai (M.S.), India 4Associate Professor, Shah & Anchor Kutchhi Engineering College, Mumbai (M.S.), India 5Assistant Professor, Shah & Anchor Kutchhi Engineering College, Mumbai (M.S.), India ---------------------------------------------------------------------***--------------------------------------------------------------------Abstract The purpose of recommendation system is to apply multiple data processing techniques and prediction algorithms aimed to predict users’ interest on services, information and products. Today, they have become an unavoidable service in our day-to-day lives. The constant increase in the number of users of the system possesses few challenges like managing and handling a large amount o...

1Student, Department of IT Engineering, Shah and Anchor Kutchhi Engineering College, Maharashtra,... more 1Student, Department of IT Engineering, Shah and Anchor Kutchhi Engineering College, Maharashtra, India. 2Student, Department of IT Engineering, Shah and Anchor Kutchhi Engineering College, Maharashtra, India. 3Student, Department of IT Engineering, Shah and Anchor Kutchhi Engineering College, Maharashtra, India. 4Professor, Department of IT Engineering, Shah and Anchor Kutchhi Engineering College, Maharashtra, India. ---------------------------------------------------------------------***---------------------------------------------------------------------Abstract In today’s fast moving, competitive world, a complimentary source of income for any individual, has become a necessity. In such adverse conditions, stock market trading proves to be one of the most appropriate, smart and reliable sources of income. One cannot trade without having a proper analysis and the background study of the respective stock. On the contrary, study of all stocks simultaneously becomes quite tedious an...

An Attempt to Improve Data Security in Text Based Cryptosystem Using Elliptic Curve Cryptography
Data can be debilitated by hackers and spies. Cryptography helps us find better approaches to sec... more Data can be debilitated by hackers and spies. Cryptography helps us find better approaches to secure information in digital form. Elliptic Curve Cryptography (ECC) is favorable over numerous cryptographic systems because of smaller keys and quick key generation. This paper proposes a system which intends to provide multifold security in text based communication. The system has two main modules: encryption, and decryption. Encoding scheme which works on variable length text block mapping technique has been exhibited, thereby enhancing data security provided by ECC in text based cryptosystems. To leverage the advantages of ECC, it is being used in many applications. This papers attempts to utilize ECC in text based cryptosystems efficiently. KeywordsECC, ASCII, Text based cryptosystem, variable length mapping, encoding. __________________________________________________*****_________________________________________________
Music Album Management System is a fully functional, flexible and convenient application and a us... more Music Album Management System is a fully functional, flexible and convenient application and a user friendly interface which provides a good experience. This paper describes the phases of the design and development and emphasizes the system's functionality.

Educational Advancements in the Field of Augmented Reality and Virtual Reality
2021 International Conference on Communication information and Computing Technology (ICCICT), 2021
Technology has constantly kept on evolving since many years. This has helped in the growth of man... more Technology has constantly kept on evolving since many years. This has helped in the growth of many fields throughout the world. One such important field is Education. Different technologies have helped education to grow positively and help everyone learn and practice with ease and understanding. Technology has proven to be a useful aid in education, as it enables teaching methods to be eased and efficiency enhanced by incorporating economical and effective means of transmitting digital content. Researchers have shown us that Virtual Reality and Augmented Reality have great potential to support two types of users: students, on the one hand, increase productivity and from the other teachers, broaden their teaching techniques. Hence, it makes the experience of education and learning more effective and stimulating. Nonetheless, even for non-skilled developers, there is no specifically designed platform for the flexible creation of AR/VR content. There is therefore a need to develop new tools to allow users to easily become producers of such experiences.

Prominence Of ECDSA Over RSA Digital Signature Algorithm
2018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 2018 2nd International Conference on, 2018
Digital signatures are replacing paper-based work to make life easier for customers and employees... more Digital signatures are replacing paper-based work to make life easier for customers and employees in various industries. We rigorously use RSA and Elliptic Curve Cryptography (ECC) for public key cryptographic algorithms. Nowadays ECDSA (Elliptical Curve Digital Signature Algorithm) gaining more popularity than the RSA algorithm because of the better performance of ECDSA over RSA. The main advantage of ECC over RSA is ECC provides the same level of security with less key size and overhead than RSA. This paper focuses on a brief review of the performance of ECDSA and RSA in various aspects like time, security and power. This review tells us about why ECC has become the latest trend in the present cryptographic scenario.

International Journal of Education and Management Engineering, 2020
In India there are currently a lot of NGOs working for noble causes. Citizens are also eager to c... more In India there are currently a lot of NGOs working for noble causes. Citizens are also eager to contribute. Unfortunately for a lot of these NGOs there is a shortage or absence of IT infrastructure, hindering their reach and effectiveness. We aim to aid such NGOs and provide them with the necessary IT infrastructure to optimize use of resources and increase their reach for food and money donations. The project includes a cross platform mobile application which will help them manage their volunteers, get orders by spreading awareness through a social media module to connect to people who wish to support them in this noble cause. There are many freelancing developers and existing apps, the goal is to extract all the best features, figure out best platforms, harness latest trends and develop the app at a cost that the NGO can afford. Our literature survey of existing app gave insights about designing the necessary modules that we must have. To have the analysis of people's attitude, habits and trends, studying papers related to social media trends inspired us to harness its power. The study of other kinds of systems using mobile applications, encouraged us to consider options of 100% cost free background, enabling us to generate an economical solution.

Indian Journal of Computer Science and Engineering, 2020
Digital Signatures are viewed as the foundation of the online exchanges of the computerized world... more Digital Signatures are viewed as the foundation of the online exchanges of the computerized world. They guarantee non repudiation for the activities of the sender and furthermore ensure security. Over some undefined time frame the digital signatures have developed and numerous enhancements have been finished by scientists to the standard plans. This paper develops an understanding of variants in accordance to their computational costs and response to attacks. The authors present a scheme which withstands the drawbacks of its predecessor the Jhong's digital signature, implements the solution and proves it to be sturdy with regard to computational costs as compared to other methods and also taking care of the attacks. The results depict the proposed scheme to be worthy either at signature generation, signature verification in terms of its computational costs or its ability to stand the attacks. Overall, the proposed scheme stands tall in all aspects.
A Survey on Elliptic Curve Based Signcryption for Information Security
PONTE International Scientific Researchs Journal, 2017

International Journal of Electrical and Computer Engineering (IJECE), 2019
With the internet today available at the user’s beck, and call data or Information Security plays... more With the internet today available at the user’s beck, and call data or Information Security plays a vital role. Confidentiality, Integrity, Availability, and Non-repudiation are the pillars of security on which every application on the web is based on. With these basic requirements the users also need the security in low resource constrained environments making it more challenging for the security experts to design secured cryptographic algorithms. Digital Signatures play a pivotal role in Authentication. They help in verifying the integrity of the data being exchanged. Elliptical curves are the strongest contenders in Digital Signatures, and much research is being done to enhance the method in many ways. The paper briefs a secured and improved ECDSA Elliptical Curve Digital Signature Algorithm which is an improved and secured version of the Digital Signature Algorithm.
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE, 2019
As of late, many new signcryption techniques are executed on elliptic cryptosystem (ECC) to lesse... more As of late, many new signcryption techniques are executed on elliptic cryptosystem (ECC) to lessen the calculation loads for devices with low computation requirements. This essential requirement has motivated the authors to present an efficient Signcryption scheme based on elliptic curve cryptography. The proposed system encompasses all the primary security parameters viz., confidentiality, authentication, integrity, unforgeability, non-repudiation and forward secrecy making the method widely accepted in several resource constrained applications.
International Journal of Computer Applications, 2016
Providing digital privacy from any kind of malicious activity is referred to as data security. It... more Providing digital privacy from any kind of malicious activity is referred to as data security. It also includes protection of data from corruption, especially threatened by hackers and eavesdroppers. Various cryptographic systems help provide data security. Elliptic Curve Cryptography(ECC) is advantageous over many cryptographic schemes due to smaller keys and very fast key generation. Smaller key size leads to moderately fast encryption and takes less processing power since computation is less. This paper presents the areas of ECC which have been researched on in depth and a comparative study of various encoding techniques used in ECC implementation.
Uploads
Papers by Dhanashree Toradmalle