Protection of Public Network Communication by using Internet Protocol Security
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 3
Abstract
This paper deals with the issue of the protection of public etwork c description of custom cipher algorithm mplementation method is given. Paper also contains xperiment description with results. In the existing literature here are numerous designs based on public ciphers epending on the specific product. It is known that professional security systems require their own design, cipher and complete control over cryptographic keys. Due to the complexity of lower evel protocols and kernel odification, the most frequently mplemented solutions are those of application level. The dvantages of implementation level (IP) used in this work – etter performance, higher level stability and end users laxation – are presented in paper. It is very important to point ut that the focus of this paper is not better performance chievement, but finding the adequate basis for application of ne’s own (custom) lgorithmommunications by using IPsec mplementation in Linux kernel. Complete
Authors and Affiliations
Mr. Premchand. B. Ambhore , Dr. B. B. Meshram , Ku. A. D. Wankhade
Implementing Ant Colony Optimization for Test Case Selection and Prioritization
Regression Testing is an inevitable and a very costly activity to be performed, often in a time and resource constrained environment. Thus we use techniques like Test Case Selection and Prioritization, to select and prio...
Exploring a Hybrid of Geospatial Semantic Information in Ubiquitous Computing Environments
Nowadays, geospatial information plays a critical role. Searching and obtaining geospatial information, however, is a difficult and time-consuming task. The Semantic Web promises to facilitate this by improving the capab...
Safety Measures Using Sextic Curve Cryptography
This paper proposes Sextic Curve Cryptography, which is used to increase the safety measures. The methods to find the critical points in the SCC based on Atriphtaloid symmetric curve using point addition and point doubli...
Improved Fuzzy C-Means Algorithm for MR Brain Image Segmentation
Segmentation is an important aspect of medical image processing, where Clustering approach is widely used in biomedical applications particularly for brain tumor detection in abnormal Magnetic Resonance Images (MRI). Fuz...
Eigenvalues of tridiagonal matrix using Strum Sequence and Gerschgorin theorem
In this paper, computational efficient technique is proposed to calculate the eigenvalues of a tridiagonal system matrix using Strum sequence and Gerschgorin theorem. The proposed technique is applicable in various contr...