Comparative Analysis of Some Encryption Algorithms and Secured Remote Protocol
Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 4
Abstract
"The need for information assurance and security all over the world cannot be overemphasized. Attacks on security of a computer or network are generally characterized as interruption, interception, modification and fabrication. The four main security issues related to these are confidentiality, authentication, integrity and non-repudiation. Cryptography is necessary and must be applied on many network layers. The Research work intends to compare some encryption algorithms and secured remote protocol based on the four main security issues and also developed a prototype attached in the appendix. "
Genetic Variation and Phylogeny Assessment of Aciagrion Occidentale (Odonata: Coenagrionidae) Using Mitochondrial Cytochrome Oxidase Subunit I Gene
Aciagrion occidentale is a migratory species widely distributed in montane and submontane areas in open grass besides weedy ponds and herbage. Here we used the COI barcode locus (522bp) to clarify the specific taxonomic...
Recent trends in Audiology: A Review
Recent trends in Audiology: A Review
Survey of Mining Order-Preserving Submatrices from Data with Repeated Measurements
There some situations, where relative magnitude of data items have more importance than their accurate values. In those situations, Order-preserving submatrices (OPSM’s) are proving to be successful in detecting concurre...
Detecting the Rootkit through Dynamic Analysis
Network security provides a security for all the programs or files or system. Some attackers attack a programs or files or passwords or other personal details of the user. Like the same way Rootkit is one of the maliciou...
Gateway Antivirus Implementation using Open Source along with Performance Testing and Improvement Analysis
Gateway Antivirus Implementation using Open Source along with Performance Testing and Improvement Analysis