Abstract

Authors and Affiliations

Nitin Vasu , Abhinav Kumar Shrivastava

Keywords

Related Articles

A Novel Security Approach in Mobile Agent Using Encryption

The appearance of software agents has given rise too much discussion of what such an agent is and how it differs from programs in general. An agent is anything that can be viewed as perceiving its environment through sen...

Conceptual Framework and Recent Trends in Project Financing

Project financing is a non-recourse financing which provides leverage, contractual structure, creates a special purpose vehicle and considers the revenue generated by the project not the general assets of the ...

An Approach to Optimize QOS Routing Protocol Using Genetic Algorithm in MANET

Quality of Service support for Mobile Ad hoc Networks is an exigent task due to dynamic topology and limited resource. To support QoS, the link state information such as delay, bandwidth, jitter, cost, error rate and no...

Biometrics Identity Authentication in Secure Electronic Transactions

There are so many ways by which a person can be identified, but authentication of a person by biometric methods is assumed to be more secure. There are many reasons behind this e.g. in this world each person is having di...

Analysis of the Protected Extensible Authentication Protocol

The Internet Engineering Task Force (IETF) has proposed new protocols for highly secured wireless networking. The purpose of this paper is to implement one such proposed security protocol - PEAP (Protected Extensible Aut...

Download PDF file
  • EP ID EP98530
  • DOI -
  • Views 124
  • Downloads 0

How To Cite

Nitin Vasu, Abhinav Kumar Shrivastava (2013).  . International Journal of Computer Science and Management Studies (IJCSMS) www.ijcsms.com, 13(2), 8-11. https://europub.co.uk/articles/-A-98530