Protection of Public Network Communication by using Internet Protocol Security
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 3
Abstract
This paper deals with the issue of the protection of public etwork c description of custom cipher algorithm mplementation method is given. Paper also contains xperiment description with results. In the existing literature here are numerous designs based on public ciphers epending on the specific product. It is known that professional security systems require their own design, cipher and complete control over cryptographic keys. Due to the complexity of lower evel protocols and kernel odification, the most frequently mplemented solutions are those of application level. The dvantages of implementation level (IP) used in this work – etter performance, higher level stability and end users laxation – are presented in paper. It is very important to point ut that the focus of this paper is not better performance chievement, but finding the adequate basis for application of ne’s own (custom) lgorithmommunications by using IPsec mplementation in Linux kernel. Complete
Authors and Affiliations
Mr. Premchand. B. Ambhore , Dr. B. B. Meshram , Ku. A. D. Wankhade
Overload Identification for Multiprocessor in Real Time System
In spite of many real time scheduling algorithms available it is not clear that these scheduling algorithms support fully the problems in the real time system in a local area network. There are certain “open loop” algori...
Classification of Breast cancer by comparing Back propagation training algorithms
Breast cancer diagnosis has been approached by various machine learning techniques for many years. This paper presents a study on classification of Breast cancer using Feed Forward Artificial Neural Networks. Back propag...
SEVERITY BASED CODE OPTIMIZATION : A DATA MINING APPROACH
Billions of lines of code are currently running in Legacy systems, mainly running machine critical systems. Large organizations and as well as small organizations extensively rely on IT infrastructure as the backbone. Th...
iImplementation of AMBA AHB protocol for high capacity memory management using VHDL
Microprocessor performance has improved rapidly these years. In contrast memory latencies and bandwidths have improved little. The result is that the memory access time is the bottleneck which limits the system performan...
Statistical Approach to Transliteration from English to Punjabi
Machine transliteration plays an important role in natural language applications such as information retrieval and machine translation, especially for handling proper nouns and technical terms. Transliteration is a cruci...