Network Security: A Study Using Cryptography Techniques
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 2
Abstract
We are study Network Security refers to all hardware and software functions, characteristics, features, operational procedures, accountability, measures, access control, and administrative and management policy required to provide an acceptable level of protection for Hardware and Software , and information in a network. Only one particular element underlies many of the security mechanisms in use: Cryptographic techniques; hence our focus is on this area Cryptography. Cryptography is an emerging technology, which is important for network security. Research on cryptography is still in its developing stages and a considerable research effort is still required for secured communication.
Authors and Affiliations
vijayaTushar Gaikwad, Mayur Patil, Prof. Vijaya Sagvekar, Prof. Divya Racha
Image Retrieval Using Textual Pre-filtering and Visual Re-ranking
This work shows the improvement inimage retrieval system by fusing the textual pre-filtering results combined with an image re-ranking for Multimedia Information Retrieval task. The goal of this paper is to fuse the tex...
Tracking and Theft Prevention System for Two Wheeler Using GSM and GPS
In automobile field, the security and theft prevention are one of the main areas in current scenario. The security goals are achieved by the GSM, GPS technology. But it is commonly used for the four wheeler and not in t...
slugA Survey on Techniques used for Detection and Tracking of Video Objects
Segmentation and tracking are two important aspects in visual surveillance systems. Many barriers such as cluttered background, camera movements, and occlusion make the robust detection and tracking a difficult problem,...
Optimization of Turning Parameters of En-8 Steel Cylindrical Rods Using Taguchi Methodology
In this research the experiments were performed by using material specimens of EN8 to know the effect of different machining parameters on tool wear. The main objective of this study was to investigate the effect of cut...
Development of Modeling Equation and Kinetics of Phosphate Removal from Pharmaceutical Effluent
Phosphates are the naturally occurring form of the element phosphorus, found in many phosphate minerals. Phosphates enter waterways from human and animal waste, phosphorous rich bedrock, laundry, cleaning, industrial ef...