Dealership Management System using C #. Designed a Digital Clock using 8051 Micro-controller. Implemented TCP/UDP File Transfer and Chat System using Java. Implemented game Snake using Java. Implemented CAPTCHA using Java. Implemented Visual Cryptography for Color Images using Matlab. Implemented Password Based Key Encryption and Diffie-Hellman Key Exchange in wireless networks using Java. Technical/Computer Skills Languages : C‚ C++‚ PHP‚ Java‚ SQL‚ JavaScript‚ HTML. Operating Systems
Premium Programming language Mumbai Key
access domain * LAN-to-WAN domain | Integrity | Access controls | * LAN-to-WAN domain * WAN domain | Confidentiality | Failover server | * WAN domain * LAN-to-WAN domain | Availability | Automatic updates | * Workstation domain | Availability | Cryptography | * LAN-to-WAN domain | Confidentiality | Data backups | * System/Application domain | Availability | Logon rights | * LAN domain | Integrity | Computer cluster | * Workstation domain | Integrity | Firewalls | * LAN domain | Confidentiality
Premium Virtual private network Computer network Operating system
information secret‚ you have two possible strategies: hide the existence of the information‚ or make the information unintelligible. Cryptography is the art and science of keeping information secure from unintended audiences‚ of encrypting it. Conversely‚ cryptanalysis is the art and science of breaking encoded data. The branch of mathematics encompassing both cryptography and cryptanalysis is cryptology. This method of secrecy has existed since 1900 B.C. in the form of Egyptian hieroglyphs. Up to
Premium Cryptography World War II Enigma machine
Subsequently‚ to secure the touchy data on the web different procedures like cryptography‚ steganography are utilized to shroud the information in advanced media. Cryptography just keeps the substance of the message mystery however some of the time it is important to keep the presence of the message mystery. In this way‚ a strategy which keeps the presence of a message mystery
Premium Scientific method Data Research
Indian Institute of Technology Delhi Hauz Khas ‚New Delhi – 110016 ADVERTISEMENT NO. 01/2014(E-1) ADVERTISEMENT FOR THE POSITIONS OF POST DOCTORAL FELLOWS IIT Delhi invites applications from qualified Indian Nationals‚ Persons of Indian Origin (PIOs) and Overseas Citizens of India (OCIs) for the Post Doctoral Fellows (PDF) in the various Departments/Centres/Schools (in the fields mentioned alongwith them). The appointment will be made exclusively for research purposes and can be for a maximum period
Premium Computer Computer science Electrical engineering
Not only from woman to woman‚ but from poet to poet‚ Elizabeth Barrett Browning felt a connection of reverence and utmost admiration with self-titled George Sand. Barrett Browning went to the lengths of seemingly serenading Sand in her two poems “To George Sand: A Desire” and “To George Sand: A Recognition.” In “To George Sand: A Desire‚” Barret Browning addresses Sand as “Thou large-brained woman and large hearted man‚” (line 1). Sand‚ whose identity as a woman was kept a secret in order to avoid
Premium Elizabeth Barrett Browning Woman Robert Browning
language and philosophy of science‚ nonsense is distinguished from sense or meaningfulness‚ and attempts have been made to come up with a coherent and consistent method of distinguishing sense from nonsense. It is also an important field of study in cryptography regarding
Premium Chennai India Performance
Public Key Infrastructure (PKI). PKI is a broad subject matter and is constantly evolving to meet the growing demands of the business world. This paper will address PKI at a relatively high-level and will not include details regarding the underlying cryptography (Weise‚ 2001). This paper will cover the history behind PKI‚ why we should us PKI‚ its purposes and functions how PKI works. Introduction With today’s security threat
Premium Public key infrastructure Certificate authority
First‚ Bloom begins his essay by stating that our imaginations are overtaken by our pleasures. “One solution to this puzzle is that the pleasures of imagination exist because they hijack mental systems that have evolved for real-world pleasure” (Bloom 577). These events take over our minds and we love to over think about them more than real-world activities. “We enjoy the imaginative experiences
Premium Mind Reality Universe
Manoj V‚ Bramhe / International Journal of Engineering and Technology Vol.3 (6)‚ 2011‚ 472-479 SMS BASED SECURE MOBILE BANKING Manoj V‚ Bramhe Department of Information Technology‚ RTM Nagpur university St. Vincent Pallotti College of Engg. And Technology‚ Nagpur‚ India manoj_bramhe@yahoo.com Abstract— M-banking has emerged as one of the main division of m-commerce. Mobile banking services consists of information inquiry‚ notifications and alerts‚ applications and payment transfer. Mobile
Premium GSM Mobile phone Short Message Service