Cyber Encryption

Authors(1) :-A. Sruthi

The paper talks about the introduction of wireless security, modes of unauthorized access and security measures. I intend to explain the generation of protocols used and their pros and cons. I also define the encryption keys that were used in each generation to manipulate security. Finally I conclude with certain protocols and their combinations that are more secured in this generation.

Authors and Affiliations

A. Sruthi
The Kingdom College, Bengaluru, Karnataka, India

Encryption, protocols and combinations.

Publication Details

Published in : Volume 4 | Issue 7 | September-October 2019
Date of Publication : 2019-10-12
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 79-82
Manuscript Number : CSEIT194714
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

A. Sruthi , "Cyber Encryption ", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 7, pp.79-82, September-October-2019. |          | BibTeX | RIS | CSV

Article Preview