A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Sivachandiran, S.
- An Emergency Mobile Ad hoc Network during Natural Disasters
Authors
1 IFET College of Engineering, IN
2 Department of Computer Application, IFET College of Engineering, IN
3 Department of Information Technology, IFET College of Engineering, Villupuram, IN
Source
Networking and Communication Engineering, Vol 8, No 2 (2016), Pagination: 35-38Abstract
To form a temporary network for mobiles using Wi-Fi direct. It is performed to communicate among them even without network provider signal. This helps in communication to signal-less area using mobile ad hoc network. This can be achieved by requesting nearby Wi-Fi-devices to connect to its nearby network that formed by Wi-Fi direct. The client of one Wi-Fi network can act as server to another hence can form a communication link among themselves.
Keywords
Wi-Fi Direct, Mobile Ad Hoc Network, Without Network Signal, Communication.- A Study on Various Cryptographic Algorithms and their Scope and Improvement towards Future Security Needs
Authors
1 IFET College of Engineering, Villupuram, IN
2 Assistant Professor of Computer Applications, Department in IFET College of Engineering, IN
Source
Networking and Communication Engineering, Vol 8, No 5 (2016), Pagination: 163-167Abstract
Over the years, numerous cryptographic algorithms have been developed and used in many different protocols and functions. Cryptography is by no means static. Steady advances in computing and in the science of cryptanalysis have made it necessary to adopt newer, stronger algorithms and larger key sizes. Older algorithms are supported in current products to ensure backward compatibility and interoperability. However, some older algorithms and key sizes no longer provide adequate protection from modern threats and should be replaced. This paper summarizes the security of cryptographic algorithms and parameters, gives concrete recommendations regarding which cryptography should be used and which cryptography should be replaced, and describes alternatives and mitigations.