Call of Papers for Current Volume ********************OnLine Paper Submission for Current Volume

Volume & Issue no: Volume 4, Issue 5(2), September - October 2015


Author Name:
Ajay Kumar, Preeti Yadav
Abstract Network Security using Encryption Techniques is a concept to protect Information over wireless network. Information security is the process of protecting information by protecting its availability, privacy and integrity. Access to stored information on computer databases has increased greatly. To provide security to information there are various types of techniques as traditional cryptographic methods like Substitution techniques, Transposition techniques, hashing Functions and algorithms like DES, RSA, AES, IDEA, ECC etc. are used. This paper focuses mainly on the different kinds of encryption techniques that are existing, and comparative study all the techniques together as a literature survey. Aim an extensive experimental study of implementations of various available encryption techniques. Keywords:- Encryption, Decryption, Network Security, Plain Text, Cipher Text, Key.
Cite this article:
Ajay Kumar, Preeti Yadav , " NETWORK SECURITY USING ENCRYPTION TECHNIQUES" , International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) , Volume 4, Issue 5(2), September - October 2015 , pp. 004-007 , ISSN 2278-6856.
Full Text [PDF]                           Back to Current Issue

NOTE: Authors note that paper cannot be withdrawn at any condition once it is accepted. The Team of IJETTCS advise you, do not submit same article to the multiple journals simultaneously. This may create a problem for you. Please wait for review report which will take maximum 01 to 02 week. 


Contact us

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)
ISSN 2278-6856
Frequency : 6 Issues/Year