Cryptographic protocol

Sort By:
Page 5 of 50 - About 500 essays
  • Better Essays

    When we live in a world with so much technology and practically living our lives online, something needs to keep our precious data safe. Cyber security was the answer to that dilemma, and keeps all of our personal information away from people who have nefarious plans for it. Cyber Security spawned from the technology age. With so many people online and some much data flowing freely, it was only a matter of time before something bad happened. Cyber security is the protection of computers, networks

    • 1500 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Wireshark Essay

    • 1022 Words
    • 5 Pages

    Therefore, gives you the tools to do in depth network analysis, it will try to capture network packets and display them as detailed as possible for analysis. Furthermore, used for troubleshooting network problems, examine security problems, debug protocol

    • 1022 Words
    • 5 Pages
    Better Essays
  • Good Essays

    forwarded to the right destination. Internet Protocol is an important protocol which helps in routing process. Generally the nodes in a Wireless Sensor Network are integrated and routing using IP version 4 is difficult as the address space is limited. IP version 4 uses 32 bit addressing mechanism which is not sufficient to complete the routing process. The other option is the use of Internet Protocol version 6. IPv6 is the latest version of Internet protocol and it uses 128 bits addressing mechanism

    • 2200 Words
    • 9 Pages
    Good Essays
  • Better Essays

    Secured PPEM based Multi-Hop Strong Path Geographic Routing protocol for MANETs Authors Name/s per 1st Affiliation (Author) Dept. name of organization (Line 1 of Affiliation - optional) Name of organization - acronyms acceptable (line 2) City, Country (line 3) name@xyz.com – optional (line 4) Authors Name/s per 2nd Affiliation (Author) Dept. name of organization (Line 1 of Affiliation - optional) Name of organization - acronyms acceptable (line 2) City, Country (line 3) name@xyz.com – optional

    • 6845 Words
    • 28 Pages
    Better Essays
  • Better Essays

    Trust and Encryption based Smart Path Routing protocol for MANETs Authors Name/s per 1st Affiliation (Author) Dept. name of organization (Line 1 of Affiliation - optional) Name of organization - acronyms acceptable (line 2) City, Country (line 3) name@xyz.com – optional (line 4) Authors Name/s per 2nd Affiliation (Author) Dept. name of organization (Line 1 of Affiliation - optional) Name of organization - acronyms acceptable (line 2) City, Country (line 3) name@xyz.com – optional (line 4)

    • 7092 Words
    • 29 Pages
    Better Essays
  • Better Essays

    concept of cryptography [15]. Cryptography refers to the art of securing data by adopting mathematical tools to encrypt and decrypt data. It aims at sending information between two parties in a way that prevents the intrusion of a third party. Cryptographic systems are associated with an algorithm as well as a secret value known as a key. Based on the agreement on a shared key between the sender and the receiver, the messages can be confidently send over an insecure channel without being concerned

    • 1596 Words
    • 7 Pages
    Better Essays
  • Good Essays

    1. ABSTRACT: Cloud Computing is an evolving technology because of it reduces the expenditure, maintenance and provides a dynamic resource pooling, virtualization, on-demand service & high availability. Cloud computing has been mentioned as a next generation architecture of IT Industries. Security & privacy is the major hurdle in the cloud environment because of its open and distributed architecture. This paper explores the cloud security threats and also discusses the existing security

    • 1826 Words
    • 8 Pages
    Good Essays
  • Better Essays

    1.1 Background Normally when we say ERP application it is generally a in premise thing , operating in a organizations premise. This project contains a ERP application, Security, Cloud services. Generally, the applications are developed in Row-oriented relational databases. In our project we are using column-oriented databases to develop the ERP application. Cloud is going to be used for back-up purposes. Security module consists of ASCII based encryption algorithm for data encryption. 1. Column-oriented

    • 1127 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Though client-side deduplication brings in advantages such as reduction of network bandwidth and data upload time, several security threats are associated with it. These threats have to be addressed in order to reap the full potential of client-side deduplication. Halevi et al. [3] identified various threats that affect a remote storage system that implements client-side deduplication. First, in traditional storage systems, privacy and confidentiality are compromised when an attacker learns the

    • 1238 Words
    • 5 Pages
    Better Essays
  • Better Essays

    AUTHENTICATION OF CRITICAL DATA USING IMAGE PROCESSING CALIFORNIA STATE UNIVERSITY, LOS ANGELES LAKSHMI SUNDARARAJAN TABLE OF CONTENTS S NO TITLE 1 SYNOPSIS 2 SYSTEM CONFIGURATION 3 EXISTING METHODOLOGY 4 PROPOSED METHODOLOGY 5 CONCLUSION 6 REFERENCES   SYNOPSIS The main goal of using the Image encryption is to avoid drawing attention to the transmission

    • 1683 Words
    • 7 Pages
    Better Essays