Search Constraints

Filtering by: Subject Encryption Remove constraint Subject: Encryption

Search Results

  • Nc580r270?file=thumbnail
    Abstract
    Nguyen, Trey
    Cryptography is the science and method of using mathematical techniques to encrypt and decrypt data. Cryptography enables you to store important information or transmit it across unsecured networks (like the Internet) so that it cannot be read by anyo . . .
  • Work
    Project
    Hakhamaneshi, Bahram
    The increasing need for protecting data communication in computer networks has led to development of several cryptography algorithms. The Advanced Encryption Standard (AES) is a computer security standard issued by the National Institute of Standards . . .
  • Work
    Project
    Anumakonda, Ashwin
    The Defense Information provides expert analysis on various areas like National security, International security and Defense policy. This Information promotes wide-range of discussions and debate on security issues such as nuclear weapons, space secur . . .
  • Work
    Project
    Azad, Vinit
    Due to the prevalent use of internet-enabled devices, confidentiality and privacy in communication has been more important than ever. Encryption algorithms, such as AES and RSA, are used to ensure the security and privacy of such communications. Howev . . .
  • Work
    Project
    Sharma, Pooja
    Hacking and Phishing are major threats in today’s informational world. Information security is a major concern for Information Technology (IT) specialists. Hackers and other untrusted parties try to access the confidential information using different . . .
  • Work
    Project
    Nerver, Deepika Singh
    FKM - “Fob Key Manager” is a web application for managing the Fob Key request-approval process using digital signatures. Fob Key Manager will enable applicants to submit their request for Fob Key by logging into the FKM system and submitting an online . . .
  • Work
    Project
    Clift, Pamela
    Encryption of data has become a necessary practice in our technological society. Encryption tries to ensure protection of important information, corporate secrets, classified information, and private information. Along with protecting data, we need to . . .
  • Work
    Project
    Patel, Bhargi
    Cloud is a collection of computers that are used for their services. Out of the many services offered, cloud is best known for its data storage. Cloud backs up files and folders varying from photos, music files to sensitive documents, mitigating the c . . .