Jitendra Singh Rathore

Learn More
Internet makes life easier, provides a best platform to do business and increases the employment and lots more the list is endless. Everything has two sides; the dark side of internet is its openness. Data are most precious in computer world, and any valuable things are viable target for thieves (hackers, crackers or intruder). Security threats are always(More)
The development and advancement in communication technology and its related techniques, users have experienced the joy of the fast information technology era. Advancements in thin devices such as smart phone like windows phone or Google Android phones has a key factor to glue on network access service. The most amazing fact is that conventional TCP/IP model(More)
as insufficient scalability, interoperability, reliability, and flexibility, as networks become more geographically distributed [1]. Another big issue is trust management. RSA, DES and Kerberos is another good methods to achieve authentication but require but high computation is a big deal for LAN, another issue is availability. In this paper, we have(More)
  • Abhijit Dwivedi, Y. K. Rana, +5 authors AnuradhaSainiand Neelam Malik
  • 2016
Computer security is to detect or prevent the process of collecting information or unauthorized access to computers. Detection is a recognition process which helps us to determine if someone tried to enter our system that have been successful, however, and what can be done. Prevention measures help us to pursue unauthorized users called as intruders from(More)
  • 1