Protection of Public Network Communication by using Internet Protocol Security
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 3
Abstract
This paper deals with the issue of the protection of public etwork c description of custom cipher algorithm mplementation method is given. Paper also contains xperiment description with results. In the existing literature here are numerous designs based on public ciphers epending on the specific product. It is known that professional security systems require their own design, cipher and complete control over cryptographic keys. Due to the complexity of lower evel protocols and kernel odification, the most frequently mplemented solutions are those of application level. The dvantages of implementation level (IP) used in this work β etter performance, higher level stability and end users laxation β are presented in paper. It is very important to point ut that the focus of this paper is not better performance chievement, but finding the adequate basis for application of neβs own (custom) lgorithmommunications by using IPsec mplementation in Linux kernel. Complete
Authors and Affiliations
Mr. Premchand. B. Ambhore , Dr. B. B. Meshram , Ku. A. D. Wankhade
Three-Dimensional Optimal Sliding-Mode Guidance for Homing Missiles Against Maneuvering Target
A new missile guidance law is proposed for highly maneuvering target by integrating optimal and sliding-mode control theories based on state dependent Riccati equation (SDRE) to achieve robustness against external distur...
CELLULAR AUTOMATA AND WATERMARING FOR IMAGE COPYRIGHT PROTECTION
In image processing there is some copyright protection and techniques are available. Digital Watermarking is the technique for copyright protection of data (image).Cellular automata is successfully applied in image proce...
Performance Evaluation of L3 Handover Latency in MIPv6
Recent years in the field of mobile communications have brought two significant requirements β seamless service delivery and Quality of Service provisioning. Seamless mobility goes hand in hand with Mobile IPv6 protocol...
AN EFFICIENT APPROACH FOR ROUTING IN WIRELESS AD HOC NETWORK USING ARTIFICIAL INTELLIGENCE
MANETs are the set of small, low infrastructure communication setup that operates by consuming the energy of batteries. Thus, it is very much important for MANETs to perform efficiently. For efficient transmission, routi...
Multi-constrained QoS Multicast Routing based on the Genetic Algorithm for MANETs
A wireless MANET is a collection of wireless mobile hosts that dynamically create a temporary network without a fixed infrastructure. The topology of the network may change unpredictably and frequently. Therefore, multic...