Computer Science and Software Engineering

Journal Title: International Journal of Scientific Research and Management - Year 2015, Vol 3, Issue 6

Abstract

Network Security i s the most vital component in information security because it is responsible for securing all information passed through networked computers. Network Security refers to all hardware and software functions, characteristics, features, operational procedures, accountability, measures, access control, and administrative and management policy required to provide an acceptable level of protection for Hardware and Software , and information in a network. Only one particular element underlies many of the security m echanisms in use: Cryptographic techniques; hence our focus is on this area Cryptography. Cryptography is an emerging technology, which is important for network security. Research on cryptography is still in its developing stages and a considerable researc h effort is still required for secured communication

Authors and Affiliations

Meenakshi Dhamija

Keywords

Related Articles

Understanding Student - Centered Learning a nd Philosophies o f Teaching Practices

In the context of today‘s volatile, uncertain and complex business environment, the business schools have started to identify the need to be innovative and to produce responsible future leaders. Teaching within higher ed...

Communication A Tool To Build Relationship Quality: Evidence From Indian Retail Banks

The purpose of this paper is to study the effect of communication on relationship quality dimensions such as trust and commitment in retail banks. Data were gathered from the retail bank customers in Che...

Image Steganography and Steganalysis : A S urvey

Stega nography is communication of secret data in an appropriate carrier, e.g. image, audio, video or TCP/IP header file. For hiding secret data in digital images, large varieties of steganogr...

A Stud y on Risk and Return Analysis o f Selected Stocks in India

Risk and return analysis plays a key role in most individual decision making process. Every investor wants to avoid risk and maximize return. In general, risk and return go hand. If an investor wishes to earn higher ret...

Nd : Yag Laser Posterior Capsulotomy A Clinical Study

Nd:YAG laser capsulotomy was carried out in 100 eyes of 99 patients in the Department of Ophthalmology ,government General Hospital,Kakinada.Among them 2 cases are aphakic and the rest were pseudophakic.Out o...

Download PDF file
  • EP ID EP216915
  • DOI -
  • Views 51
  • Downloads 0

How To Cite

Meenakshi Dhamija (2015). Computer Science and Software Engineering. International Journal of Scientific Research and Management, 3(6), -. https://europub.co.uk/articles/-A-216915