Manuscript Number : CSEIT194714
Cyber Encryption
Authors(1) :-A. Sruthi The paper talks about the introduction of wireless security, modes of unauthorized access and security measures. I intend to explain the generation of protocols used and their pros and cons. I also define the encryption keys that were used in each generation to manipulate security. Finally I conclude with certain protocols and their combinations that are more secured in this generation.
A. Sruthi Encryption, protocols and combinations. Publication Details Published in : Volume 4 | Issue 7 | September-October 2019 Article Preview
The Kingdom College, Bengaluru, Karnataka, India
Date of Publication : 2019-10-12
License: This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 79-82
Manuscript Number : CSEIT194714
Publisher : Technoscience Academy