Advertisement

Protecting Computer Network with Encryption Technique: A Study

  • Kamaljit I. Lakhtaria
Part of the Communications in Computer and Information Science book series (CCIS, volume 151)

Abstract

In today’s world the networking plays a very important role in our life. Most of the activities occur through the Internet. For the safe and secured exchange of information, we need to have security. The encryption has very wide applications for securing data. Latest authentication deals with biometric application such as fingerprint and retina scan. The different types of encryptions and their strength and standards are discussed.

Keywords

Encryption Network Security Authentication Biometric 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Krebs, B.: The Washington Post, Forty Percent of Web Users Surf with Unsafe Browsers, July 1 (2008)Google Scholar
  2. 2.
    Tyson, J.: How Encryption works: Introduction to How Encryption worksGoogle Scholar
  3. 3.
    Stallings, W.: Cryptography and Network Security: Principles and Practices, 3rd edn., p. 45. Pearson Education, Inc and Dorling Kindersley Publishing Inc., USA (2006)Google Scholar
  4. 4.
    Stallings, W.: Cryptography and Network Security: Principles and Practices, 3rd edn., pp. 32–33. Pearson Education, Inc., USA (2006)Google Scholar
  5. 5.
    Callas, J.: An Introduction to Cryptography (September 2006)Google Scholar
  6. 6.
    Cobb, C.: Cryptography For Dummies The PKIPrimer. John Wiley and Sons, Chichester (2004)Google Scholar
  7. 7.
    Tyson, J.: How Encryption works: SSL and TSL. How Stuff Works WebsiteGoogle Scholar
  8. 8.
    Stallings, W.: Cryptography and NetworkSecurity: Principles and Practices, 3rd edn., p. 29. Pearson Education, Inc., Dorling Kindersley Publishing Inc., USA (2006)Google Scholar
  9. 9.
    Stallings, W.: Cryptography and NetworkSecurity: Principles and Practices, 3rd edn., pp. 90–150. Pearson Education, Inc., Dorling Kindersley Publishing Inc., USA (2006)Google Scholar
  10. 10.
    Online encryption software, http://infoencrypt.com/
  11. 11.
    Cavoukian, A., Stoianov, A.: Biometric Encryption: A Positive-Sum Technology that Aczieves Strong Authentication, Security and Privacy, p. 15 (March 2006)Google Scholar
  12. 12.
    Moulds, R.: The Future of Encryption, nCipher website (2008)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Kamaljit I. Lakhtaria
    • 1
  1. 1.MCA DepartmentAtmiya Institute of Technology & ScienceRajkotIndia

Personalised recommendations