A Review Paper on Comparative Study of FPGA Implementation of Adhoc Security Algorithms
Journal Title: INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY - Year 2013, Vol 7, Issue 1
Abstract
Nowadays data security is an important issue for decentralized networks like Adhoc Network. In this paper, we have proposed the study of five FPGA implementated data security algorithms specially designed for adhoc network. We have proposed the role of FPGAs within a security system and provided the solutions to security challenges. The result shows that FPGA implementation outperforms software and processors implementation by 20 and 140 times respectively.
Authors and Affiliations
Dr. Seema Verma, Pooja Srivastava, Divya Ramavat, Nupur Srivastava
Composition of Advances in the District Central Cooperative Banks in Punjab
The Banking scene in India has undergone a tremendous change due to the Narsimham Committee recommendations since 1992 i.e. with the advent of the new economic policy. It emphasized shift from centralized planning to ind...
IT Governance in Enterprise Resource Planning and Business Intelligence Systems Environment: a Conceptual Framework
A large number of studies has been carried out on IT governance during the last decade, with the aim to support companies in implementing IT governance frameworks aligned with the business strategy. However, companies wh...
Measuring the Performance of Saudi Domestic Airports Using Data Envelopment Analysis(DEA)"
The following research is aimed at evaluating the performance of domestic airports in Saudi Arabia with the help of Data Envelopment Analysis (DEA), based on outputs and inputs of the airports . A total of 21 domestic ai...
VIABLE DIAGNOSIS OF ICT POLICY MANAGEMENT IN THE CONTEXT OF HIGHER EDUCATION
Information and Communication Technology (ICT) policy is a code that clarifies the duties, responsibilities and rights of technology stakeholders and specifies acceptable and efficient ICT utilization. ICT policy is very...
Classes of Unique Face and Its Classification
Near resembling faces ,Look alike faces, disguised faces and many more are todays challenges for researchers in the field of face recognition and these challenges become more serious in case of large facial Variations. H...