"Publickey cryptography" Essays and Research Papers

Sort By:
Satisfactory Essays
Good Essays
Better Essays
Powerful Essays
Best Essays
Page 38 of 50 - About 500 Essays
  • Good Essays

    E-commerce is an outcome of globalization and technology outbreak of 21st century. Increasingly‚ more products and services are sold over Internet; hence‚ there is a growing need for a combination of legislation and technical solutions to globally secure customer privacy. Credit card fraud is one of the crimes especially when it is used for web-based transaction. In this paper‚ a technical solution using Iris authentication technique is proposed for protecting identity theft in

    Premium Iris recognition Credit card fraud Credit card

    • 1086 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    NETWORK SECURITY WITH RFID SYSTEM AND CRYPTOGRAPHY ABSTRACT: Wireless communication is very common and widely applicable technique in communication field. In these field new techniques invented that is called RFID technique‚ in which object having RFID tags on them are being accessed in radio frequency region. Cryptography (method involves the both process “encryption” and “decryption”) is widely used in network system’s security. It is also the ancient method of encoding

    Premium RFID

    • 1385 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Cloud Computing

    • 52986 Words
    • 212 Pages

    CryptoNET:  Generic Security Framework  for   Cloud Computing Environments  Abdul Ghafoor Abbasi  A Doctoral Dissertation in  Communication Systems  School of Information and Communication Technologies (ICT)  KTH ‐ Stockholm‚ Sweden‚ 2011    2|Page                                                                           TRITA ‐ ICT ‐ COS ‐1102        KTH‚ School of Information and  ISSN: 1653‐6347          Communication Technology 

    Premium Computer security Information security Cloud computing

    • 52986 Words
    • 212 Pages
    Satisfactory Essays
  • Good Essays

    Rewqf

    • 2299 Words
    • 10 Pages

    Blu-Ray Disc Mir Nazish Hussain S. N. Murthy Kalluri Dept. of Computer Science & Engg. Koneru Lakshmaiah College of Engineering‚ Vadeeswaram‚ Guntur. Abstract The thrust for an advanced format of data storage on optical disc led to revolutionary introduction of BLU-RAY DISC. This advances in the race against its competitors DVD (Digital Video Disc) & AOD (Advanced Optical Disc) in that it has high storage capacity‚ advanced security and privacy features and the

    Premium Blu-ray Disc Computer data storage

    • 2299 Words
    • 10 Pages
    Good Essays
  • Satisfactory Essays

    Steganography

    • 527 Words
    • 6 Pages

    STEGANOGRAPHY IN VIDEOS SONAM GUMBER 1156357 OVERVIEW oIntroduction to Core Java oSteganography Defined oVideo Steganography oExamples in History oSteganography with Cryptography oDigital Approaches oReasons For Using Digital Videos oFlow work of video steganography oComparison b/w original and modified video oAdvantages INTRODUCTION TO CORE JAVA Java is a general-purpose‚ concurrent‚ classbased‚ object-oriented computer programming language that is specifically designed to have as few implementation

    Premium

    • 527 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Andrew Alaniz Essay

    • 494 Words
    • 2 Pages

    important to efficiently manage and address possible security risks related with telecommunication infrastructure and it is his favorite domain to work with. Cryptography is his another favorite domain because it allow organizations to do business electronically safely. He like to keep his company data protected by encryption. Cryptography is very important to the carry on growth of the Internet and electronic commerce. Andrew Alaniz says all of the domains are important‚ but my least favorite is

    Premium Management Computer security Security

    • 494 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Technical Paper 502

    • 1305 Words
    • 5 Pages

    Technical Paper: Risk Assessment Global Finance‚ Inc. Network Diagram Above is the Global Finance‚ Inc. (GFI) network diagram. GFI has grown rapidly this past year and acquired many network devices as displayed in the diagram. The company invested in the network and designed it to be fault tolerant and resilient from any network failures. However‚ although the company’s financial status has matured and its network has expanded at a rapid pace‚ its network security has not kept up with the company

    Free Risk Security

    • 1305 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Forced Perspective

    • 892 Words
    • 3 Pages

    to each other would be displaced by several feet in depth from the camera. This‚ in a still shot‚ makes some characters appear much smaller in relation to others. There are many ways forced perspective can be used. It is most commonly used in Cryptography and Film making. It is used as an optical allusion and often confuses people‚ making them see things that are not actually there. Forced perspective plays with their mind and their sight to achieve what is wanted. Forced Perspective is a technique

    Premium Photography Optics Book of Optics

    • 892 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Communication has always been important with in the military from day one. Wihtout this communication no soldier would know where to be or when to be there. When the U.S. military first began we fought in a completely different style than we do today. Back then there was alot more chivalry to war to than there is today. They stood on line with their chests out proud of what they were doing. Without communication the first rank would not know when to fire their muskets‚ when to take a knee‚ when to

    Premium English-language films Family Thought

    • 3236 Words
    • 13 Pages
    Better Essays
  • Powerful Essays

    Nt2580 Notes

    • 1034 Words
    • 5 Pages

    Responses on port 80= a web service is running. HTTP Port 443- HTTPS To run port scans all you need is access to the LAN and/or subnet Technet.microsoft.com/en-us/security/advisory Mitigate vulnerabilities Threats are things you have to respond to effectively. Threats are controllable Risks are manageable Vulnerabilities can be mitigated All affect the CIA triad Not all threats are intentional Confidentiality‚ integrity‚ accessibility = CIA Starting on pg 161 DAC- only as secure as

    Premium Business continuity planning

    • 1034 Words
    • 5 Pages
    Powerful Essays
Page 1 35 36 37 38 39 40 41 42 50