Review of MANETS Using Distributed Public-key Cryptography
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 10, Issue 3
Abstract
Ensuring security is something that is not easily done as many of the demands of network security conflict with the demands of mobile networks, majorly because of the nature of the mobile devices (e.g. low power consumption, low processing load). The study of secure distributed key agreement has great theoretical and practical significance. Securing Mobile Ad-hoc Networks using Distributed Public-key Cryptography in pairing with Mobile Ad hoc Networks and various protocols are essential for secure communications in open and distributed environment.
Authors and Affiliations
Ms. Rajni , Ms. Reena
Tight Bounds on SINR with ZFBF and Feedback
The concept of Multiple Input Multiple Output (MIMO) is an advanced one in the field of wireless communications. The main objective behind the MIMO is providing high data rates to multiple users at a time. MIMO also aims...
Design an Algorithm for Data Encryption and Decryption Using Pentaoctagesimal SNS
Encryption is the most effective way of computer science concerned with developing schemes and formula to achieve data and information security through the use of codes. Today the privacy is the main issue to sending inf...
Survey on Security Issues and Solutions in Cloud Computing
Cloud computing is a combination of several key technologies that have evolved and matured over the years. Cloud computing has a potential for cost savings to the enterprises but the security risk are also enormous. Clou...
Security Protection Mechanism for Social Networking Websites Based on Real-Time Proxy
During the last two decades Information technology has grown tremendously and became the main source of knowledge. In past few years the world getting closer and closer this is only because of Social networking websites...
A Survey of Machine Learning Algorithm in Network Traffic Classification
Network Traffic Classification is an emerging research area and now a day the research is widely used in various activities such as intrusion detection system and for security purpose. Many of the protocols and proposed...