A STUDY ON NETWORK SECURITY TECHNIQUES

Abstract

 Internet plays a vital role in our day today life. Data security in web application has become very crucial. The usage of internet becomes more and more in recent years. Through internet the information’s can be shared through many social networks like Facebook, twitter, LinkedIn, blogs etc. There is chance of hacking the data while sharing from one to one. To prevent the data being hacked there are so many techniques such as Digital Signature, Cryptography, Digital watermarking, Data Sanitization can be implemented. This paper focus on the various techniques which is used to protect the data.

Authors and Affiliations

Dr. T. Hemalatha*

Keywords

Related Articles

 KINETIC OF THE PHYSICAL QUALITY CHANGES DURING DEEP FAT FRYING OF SWEET POTATO CHIP

 Investigation was carried out to study kinetics of moisture loss, oil uptake, lightness and textural changes during deep fat frying of sweet potato (Ipomoea batatas L.) chip. Sweet potato slides of 2mm thickness w...

 DESIGN OPTIMIZATION OF DRAG CONVEYOR CHAIN : AN ANALYSIS FOR ENVIRONMENTAL IMPACT EVALUTION

 Abstract- Nowadays, environmental problems have aroused public awareness about the trade-off between economic growth and environmental conservation. In this regard, sustainable product development plays an importa...

 Characterization of Pr6O11-Ag2O-B2O3 Glasses

 Silver borate glasses doped with Praseodymium of different concentration has been prepared by melt quench technique. X-ray diffraction pattern shows that there is no sharp peak it confirms the amorphous nature of...

Spectrum sensing Techniques In Cognitive Radio

The growing insist of wireless applications has put a lot of constraint on the usage of available radio spectrum which is limited and valuable resource. However, a fixed spectrum assignment has lead to under utilization...

 INVESTIGATE THE MANIPULATION OF KINEMATICS ON TENNIS SERVE PERFORMANCE

 The study aimed to explore the effect of elite tennis player body kinematics during preparatory, force generation and follow through phase ( between first serve and second serve) at three different time period...

Download PDF file
  • EP ID EP133280
  • DOI 10.5281/zenodo.47011
  • Views 56
  • Downloads 0

How To Cite

Dr. T. Hemalatha* (30).  A STUDY ON NETWORK SECURITY TECHNIQUES. International Journal of Engineering Sciences & Research Technology, 5(3), 164-168. https://europub.co.uk/articles/-A-133280