Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/3759
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.coverage.spatial | Computer Science | en_US |
dc.date.accessioned | 2012-04-25T07:02:40Z | - |
dc.date.available | 2012-04-25T07:02:40Z | - |
dc.date.issued | 2012-04-25 | - |
dc.identifier.uri | http://hdl.handle.net/10603/3759 | - |
dc.description.abstract | Internet today has become a vital part of day to day life, owing to the revolutionary changes it has brought about in various fields. Dependence on the Internet as an infonnation highway and knowledge bank is exponentially increasing so that a going back is beyond imagination. Transfer of critical infonnation is also being carried out through the Internet. This widespread use of the Internet coupled with the tremendous growth in e-commerce and mcommerce has created a vital need for infonnation security. Internet has also become an active field of crackers and intruders. The whole development in this area can become null and void if fool-proof security of the data is not ensured without a chance of being adulterated. It is, hence a challenge before the professional community to develop systems to ensure security of the data sent through the Internet. Stream ciphers, hash functions and message authentication codes play vital roles in providing security services like confidentiality, integrity and authentication of the data sent through the Internet. There are several such popular and dependable techniques, which have been in use widely, for quite a long time. This long term exposure makes them vulnerable to successful or near successful attempts for attacks. Hence it is the need of the hour to develop new algorithms with better security. | en_US |
dc.format.extent | x, 165p. | en_US |
dc.language | English | en_US |
dc.relation | No. of references 103 | en_US |
dc.rights | university | en_US |
dc.title | Studies, design and development of network security enhancement services using novel cryptographic algorithms | en_US |
dc.creator.researcher | Mathew, Sheena | en_US |
dc.subject.keyword | Network security | en_US |
dc.subject.keyword | Computer Science | en_US |
dc.subject.keyword | Novel cryptographic algorithms | en_US |
dc.subject.keyword | Internet | en_US |
dc.description.note | Summary p. 141-148, List of publications p. 149-151, Bibliography p. 152-165 | en_US |
dc.contributor.guide | Jacob, K Poulose | en_US |
dc.publisher.place | Cochin | en_US |
dc.publisher.university | Cochin University of Science and Technology | en_US |
dc.publisher.institution | Department of Computer Science | en_US |
dc.date.registered | n.d. | en_US |
dc.date.completed | 16/06/2008 | en_US |
dc.date.awarded | 2008 | en_US |
dc.format.accompanyingmaterial | None | en_US |
dc.type.degree | Ph.D. | en_US |
dc.source.inflibnet | INFLIBNET | en_US |
Appears in Departments: | Department of Computer Science |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 14.92 kB | Adobe PDF | View/Open |
02_certificate.pdf | 23.06 kB | Adobe PDF | View/Open | |
03_declaration.pdf | 16.14 kB | Adobe PDF | View/Open | |
04_acknowledgements.pdf | 26.54 kB | Adobe PDF | View/Open | |
05_abstract.pdf | 34.77 kB | Adobe PDF | View/Open | |
06_contents.pdf | 68.98 kB | Adobe PDF | View/Open | |
07_list of algorithms figures & tables.pdf | 58.34 kB | Adobe PDF | View/Open | |
08_chapter 1.pdf | 198.87 kB | Adobe PDF | View/Open | |
09_chapter 2.pdf | 975.89 kB | Adobe PDF | View/Open | |
10_chapter 3.pdf | 704.61 kB | Adobe PDF | View/Open | |
11_chapter 4.pdf | 238.37 kB | Adobe PDF | View/Open | |
12_chapter 5.pdf | 121.5 kB | Adobe PDF | View/Open | |
13_chapter 6.pdf | 116.65 kB | Adobe PDF | View/Open | |
14_list of publications.pdf | 36.29 kB | Adobe PDF | View/Open | |
15_bibliography.pdf | 219.63 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: