Results for Network

CRYPTOGRAPHY AND NETWORK SECURITY

Ahamed Yaseen 07:39
Abstract:          The conversion of data into a secret code for transmission over a public network is called cryptography.  The original ... Read More
CRYPTOGRAPHY AND NETWORK SECURITY CRYPTOGRAPHY AND NETWORK SECURITY Reviewed by Ahamed Yaseen on 07:39 Rating: 5

INTERNAL NETWORK SECURITY

Ahamed Yaseen 07:37
ABSTRACT     Firewalls have been around for several years, and they are a natural component of most networks connected to the Internet. In... Read More
INTERNAL NETWORK SECURITY INTERNAL NETWORK SECURITY Reviewed by Ahamed Yaseen on 07:37 Rating: 5

CRYPTOGRAPHY

Ahamed Yaseen 07:36
 Abstract I am very happy to present a paper titled ‘Cryptography- secure way of communication’. I had started with the introduction of C... Read More
CRYPTOGRAPHY CRYPTOGRAPHY Reviewed by Ahamed Yaseen on 07:36 Rating: 5

CRYPTOGRAPHY AND RC4 ENCRYPTION ANALYSIS

Ahamed Yaseen 07:34
ABSTRACT     Cryptography the art of writing secret code plays a very important role in network security . There are various  existing algor... Read More
CRYPTOGRAPHY AND RC4 ENCRYPTION ANALYSIS CRYPTOGRAPHY AND RC4 ENCRYPTION ANALYSIS Reviewed by Ahamed Yaseen on 07:34 Rating: 5

SECURITY IN AD-HOC ROUTING PROTOCOLS]

Ahamed Yaseen 07:32
In this paper we focus on the security issues related to ad hoc routing protocols in particular. The routing in ad hoc networks remains a ke... Read More
SECURITY IN AD-HOC ROUTING PROTOCOLS] SECURITY IN AD-HOC ROUTING PROTOCOLS] Reviewed by Ahamed Yaseen on 07:32 Rating: 5

A New Anti-Spam Protocol

Ahamed Yaseen 07:31
Abstract  Today sending spams has turned to be a major problem in the Internet. It is so serious that more than 80% of the transferred email... Read More
A New Anti-Spam Protocol A New Anti-Spam Protocol Reviewed by Ahamed Yaseen on 07:31 Rating: 5
Powered by Blogger.