Network Security: A Study Using Cryptography Techniques

Abstract

We are study Network Security refers to all hardware and software functions, characteristics, features, operational procedures, accountability, measures, access control, and administrative and management policy required to provide an acceptable level of protection for Hardware and Software , and information in a network. Only one particular element underlies many of the security mechanisms in use: Cryptographic techniques; hence our focus is on this area Cryptography. Cryptography is an emerging technology, which is important for network security. Research on cryptography is still in its developing stages and a considerable research effort is still required for secured communication.

Authors and Affiliations

vijayaTushar Gaikwad, Mayur Patil, Prof. Vijaya Sagvekar, Prof. Divya Racha

Keywords

Related Articles

Image Retrieval Using Textual Pre-filtering and Visual Re-ranking

This work shows the improvement inimage retrieval system by fusing the textual pre-filtering results combined with an image re-ranking for Multimedia Information Retrieval task. The goal of this paper is to fuse the tex...

Tracking and Theft Prevention System for Two Wheeler Using GSM and GPS

In automobile field, the security and theft prevention are one of the main areas in current scenario. The security goals are achieved by the GSM, GPS technology. But it is commonly used for the four wheeler and not in t...

slugA Survey on Techniques used for Detection and Tracking of Video Objects

Segmentation and tracking are two important aspects in visual surveillance systems. Many barriers such as cluttered background, camera movements, and occlusion make the robust detection and tracking a difficult problem,...

Optimization of Turning Parameters of En-8 Steel Cylindrical Rods Using Taguchi Methodology

In this research the experiments were performed by using material specimens of EN8 to know the effect of different machining parameters on tool wear. The main objective of this study was to investigate the effect of cut...

Development of Modeling Equation and Kinetics of Phosphate Removal from Pharmaceutical Effluent

Phosphates are the naturally occurring form of the element phosphorus, found in many phosphate minerals. Phosphates enter waterways from human and animal waste, phosphorous rich bedrock, laundry, cleaning, industrial ef...

Download PDF file
  • EP ID EP19628
  • DOI -
  • Views 276
  • Downloads 5

How To Cite

vijayaTushar Gaikwad, Mayur Patil, Prof. Vijaya Sagvekar, Prof. Divya Racha (2015). Network Security: A Study Using Cryptography Techniques. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 3(2), -. https://europub.co.uk/articles/-A-19628