Cyber Encryption

Authors

  • A. Sruthi   The Kingdom College, Bengaluru, Karnataka, India

Keywords:

Encryption, protocols and combinations.

Abstract

The paper talks about the introduction of wireless security, modes of unauthorized access and security measures. I intend to explain the generation of protocols used and their pros and cons. I also define the encryption keys that were used in each generation to manipulate security. Finally I conclude with certain protocols and their combinations that are more secured in this generation.

References

Downloads

Published

2019-10-12

Issue

Section

Research Articles

How to Cite

[1]
A. Sruthi , " Cyber Encryption , IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 7, pp.79-82, September-October-2019.