Laplace Transformation based Cryptographic Technique in Network Security
نویسندگان
چکیده
منابع مشابه
Network Security Using Cryptographic Techniques
Network Security is the most vital component in information security because it is responsible for securing all information passed through networked computers. Network Security refers to all hardware and software functions, characteristics, features, operational procedures, accountability, measures, access control, and administrative and management policy required to provide an acceptable level...
متن کاملMulti-Layered Cryptographic Processor for Network Security
This paper presents a multi-layered architecture for the security of network and data using a layered structure of cryptographic algorithms. This architecture gives benefit of low area and high speed requirement. This paper mainly concern for security so architecture is designed in layers to avoid the possibilities of invasion from outsiders. This paper implements a combination of Private-Publi...
متن کاملNetwork Security using Firewall and Cryptographic Authentication
The network Security is the hottest topic in the current research scenario. The information security is really threatened by obnoxious users. With increasing vulnerabilities, caused by port scan attacks, replay attacks and predominantly IP Spoofing, targeting services, the network behavior is getting malevolent. But there is a lack of any clear threat model. The authors have endeavored to consi...
متن کاملPriority Based Rsa Cryptographic Technique
The RSA algorithm is one of the most commonly used efficient cryptographic algorithms. It provides the required amount of confidentiality, data integrity and privacy. This paper integrates the RSA Algorithm with round-robin priority scheduling scheme in order to extend the level of security and reduce the effectiveness of intrusion. It aims at obtaining minimal overhead, increased throughput an...
متن کاملLaplace transformation updated
The traditional theory of Laplace transformation (TLT) as it was put forward by Gustav Doetsch was principally intended to provide an operator calculus for ordinary derivable functions of the t-domain. As TLT does not account for the behavior of the inverse L-transform at t = 0 its validity is essentially confined to t > 0. However, from solutions of linear differential equations (DEs) one can ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2016
ISSN: 0975-8887
DOI: 10.5120/ijca2016908482