Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

A Survey on Network Security Based on Cryptographic Techniques


Affiliations
1 Department of Computer Science, Sri Krishna Adithya College of Arts and Science, Coimbatore, India
     

   Subscribe/Renew Journal


Network security is mainly used to provide security for the information which has been transmitted from one party to another party, which should not get accessed by the unauthorised people. This survey provides an overview of network security and the techniques of cryptography through which the security can be provided in all sort of the complete information travelling through networks. The information/data generally passing as a form of packets from one end to another end. Meanwhile how the information's will get protected is the main challenge and it is been protected by the technique called "CRYPTOGRAPHY".

Keywords

Network Security, Unauthorised Access, Packets, Cryptography.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 181

PDF Views: 4




  • A Survey on Network Security Based on Cryptographic Techniques

Abstract Views: 181  |  PDF Views: 4

Authors

M. Nachammai
Department of Computer Science, Sri Krishna Adithya College of Arts and Science, Coimbatore, India
R. Krithika
Department of Computer Science, Sri Krishna Adithya College of Arts and Science, Coimbatore, India
A. Madhusri
Department of Computer Science, Sri Krishna Adithya College of Arts and Science, Coimbatore, India

Abstract


Network security is mainly used to provide security for the information which has been transmitted from one party to another party, which should not get accessed by the unauthorised people. This survey provides an overview of network security and the techniques of cryptography through which the security can be provided in all sort of the complete information travelling through networks. The information/data generally passing as a form of packets from one end to another end. Meanwhile how the information's will get protected is the main challenge and it is been protected by the technique called "CRYPTOGRAPHY".

Keywords


Network Security, Unauthorised Access, Packets, Cryptography.