This book is written for the benefit of the students who are pursuing their Ph.D (CSE), MTech., MCA, Msc (Comp), BTech of various universities across India and Master Degrees in foreign Universities. Especially the content of this book acts as a basis for the research scholars and post doctoral in the area of information security. This book aimed a cryptosystem, rather than use of a single or conjunct with limited nonce core-key directly in cryptographically process data, one can use core-key as master key to derive unlimited sub-keys, and use of these sub-keys in cryptosystem. In this work we are using pseudo-random bit generator for re-keying. Simulation is performed using Java 1.6 and IDE Netbeans 6.3, tested the same with sample data and obtained results are presented. This mechanism adopted as a communication service in a chat application and simulated the Man-in-the-Middle-Attack. Analysis reports of various tests performed are also presented. We have taken at most care to avoid errors, but there could be few minor errors. We will be very much grateful those who point out the errors and bring to our notice with relevant suggestions for improvements of the book in all aspects.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
Dr. P Penchalaiah received Ph.D in computer science, got qualified UGC-NET and AP-SET in Computer Science / Applications. He has more than 12 years of experience (Academic and Industry). His research papers were published in various UGC approved journals and authored two books. His area of interest are Information Security and Data mining.
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
Anbieter: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Deutschland
Taschenbuch. Zustand: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This book is written for the benefit of the students who are pursuing their Ph.D (CSE), MTech., MCA, Msc (Comp), BTech of various universities across India and Master Degrees in foreign Universities. Especially the content of this book acts as a basis for the research scholars and post doctoral in the area of information security. This book aimed a cryptosystem, rather than use of a single or conjunct with limited nonce core-key directly in cryptographically process data, one can use core-key as master key to derive unlimited sub-keys, and use of these sub-keys in cryptosystem. In this work we are using pseudo-random bit generator for re-keying. Simulation is performed using Java 1.6 and IDE Netbeans 6.3, tested the same with sample data and obtained results are presented. This mechanism adopted as a communication service in a chat application and simulated the Man-in-the-Middle-Attack. Analysis reports of various tests performed are also presented. We have taken at most care to avoid errors, but there could be few minor errors. We will be very much grateful those who point out the errors and bring to our notice with relevant suggestions for improvements of the book in all aspects. 204 pp. Englisch. Bestandsnummer des Verkäufers 9786200221285
Anzahl: 2 verfügbar
Anbieter: moluna, Greven, Deutschland
Zustand: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Penchalaiah Dr. PadugupatiDr. P Penchalaiah received Ph.D in computer science, got qualified UGC-NET and AP-SET in Computer Science / Applications. He has more than 12 years of experience (Academic and Industry). His research papers . Bestandsnummer des Verkäufers 300309912
Anzahl: Mehr als 20 verfügbar
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Taschenbuch. Zustand: Neu. This item is printed on demand - Print on Demand Titel. Neuware -This book is written for the benefit of the students who are pursuing their Ph.D (CSE), MTech., MCA, Msc (Comp), BTech of various universities across India and Master Degrees in foreign Universities. Especially the content of this book acts as a basis for the research scholars and post doctoral in the area of information security. This book aimed a cryptosystem, rather than use of a single or conjunct with limited nonce core-key directly in cryptographically process data, one can use core-key as master key to derive unlimited sub-keys, and use of these sub-keys in cryptosystem. In this work we are using pseudo-random bit generator for re-keying. Simulation is performed using Java 1.6 and IDE Netbeans 6.3, tested the same with sample data and obtained results are presented. This mechanism adopted as a communication service in a chat application and simulated the Man-in-the-Middle-Attack. Analysis reports of various tests performed are also presented. We have taken at most care to avoid errors, but there could be few minor errors. We will be very much grateful those who point out the errors and bring to our notice with relevant suggestions for improvements of the book in all aspects.VDM Verlag, Dudweiler Landstraße 99, 66123 Saarbrücken 204 pp. Englisch. Bestandsnummer des Verkäufers 9786200221285
Anzahl: 1 verfügbar
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - This book is written for the benefit of the students who are pursuing their Ph.D (CSE), MTech., MCA, Msc (Comp), BTech of various universities across India and Master Degrees in foreign Universities. Especially the content of this book acts as a basis for the research scholars and post doctoral in the area of information security. This book aimed a cryptosystem, rather than use of a single or conjunct with limited nonce core-key directly in cryptographically process data, one can use core-key as master key to derive unlimited sub-keys, and use of these sub-keys in cryptosystem. In this work we are using pseudo-random bit generator for re-keying. Simulation is performed using Java 1.6 and IDE Netbeans 6.3, tested the same with sample data and obtained results are presented. This mechanism adopted as a communication service in a chat application and simulated the Man-in-the-Middle-Attack. Analysis reports of various tests performed are also presented. We have taken at most care to avoid errors, but there could be few minor errors. We will be very much grateful those who point out the errors and bring to our notice with relevant suggestions for improvements of the book in all aspects. Bestandsnummer des Verkäufers 9786200221285
Anzahl: 1 verfügbar
Anbieter: Mispah books, Redhill, SURRE, Vereinigtes Königreich
paperback. Zustand: New. NEW. SHIPS FROM MULTIPLE LOCATIONS. book. Bestandsnummer des Verkäufers ERICA82962002212866
Anzahl: 1 verfügbar