scholarly journals A Synoptic View on Network Security and Cryptography

Author(s):  
Divya J Nair

Abstract: Cryptography is a tool that guards a network and data transmission over a network. Data Security is the core aspect of secure data transmission over untrustworthy network. Network security encompasses the authorization of access to data in a network, which is organized by the network administrator. Users select or are assigned an ID and password or other authenticating information that permits them access to information and programs within their control. Network security covers a wide range of computer networks, both public and private, that are used in ordinary jobs performing transactions and communications among businesses, government agencies and individuals. Networks may be private, such as within a company, or private which allow access to the public. Network security is involved in every type of institutions. In this article we concisely outlined Network security and cryptography along with its basic principles. Keywords: Network, Network Security, Cryptography, Asymmetric Cryptosystems, Symmetric Cryptosystems

2017 ◽  
Vol 5 (4RACSIT) ◽  
pp. 86-90
Author(s):  
Meghana K M ◽  
Manjunath C R

Blood Pressure Monitoring using sensor and cloud technology, Personal biological readings such as blood pressure are collected by sensor networks device from patients at homes and will be transmitted to cloud and get treated accordingly. It is very important that privacy of patient’s medical condition is protected while data are being transmitted over the public network as well as when they are stored in servers. In this paper, a unique Cryptography technique has been used, Cryptography allows privacy of data that is transmitted. This will ensure that it is implemented for small foot print using IOT for secure data transmission. While data is transmitting to cloud Doctor will get email/message notification and Doctor can also view the Patient Blood Pressure Record stored in cloud.


2005 ◽  
Vol 20 (2) ◽  
pp. 183-204 ◽  
Author(s):  
Gary Warnaby ◽  
David Bennison ◽  
Barry J. Davies

The role of town centre management (TCM) schemes in the UK has expanded to incorporate a more overt and explicit focus on marketing and promotion. This paper considers the marketing/promotional activities of TCM schemes in the UK. TCM schemes operate at the interface of the public and private sectors. The implications of this are discussed, including the need for a consensual approach by a wide range of urban stakeholders, and the actual activities undertaken, influenced by the funding imperative under which such schemes operate (which impacts on the feasibility of certain activities and the efforts made to evaluate them). Comparisons are drawn between specific place marketing practice by TCM schemes and wider place marketing strategies.


Game Theory ◽  
2017 ◽  
pp. 369-382
Author(s):  
Sungwook Kim

Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. It involves the authorization of access to data in a network, which is controlled by the network administrator. Usually, network security covers a variety of computer networks, both public and private, that are used in everyday jobs conducting transactions and communications among businesses, government agencies, and individuals. This chapter explores network security.


Author(s):  
Nicholas N. Bowersox

Recent business practices over the past decade have been tainted with corporate restructuring strategies such as downsizing, reorganizations, and job redesigns. With the hopes of increasing efficiency, gaining productivity, and reducing costs, many companies have participated in such efforts. However, one must consider the irony behind this shrewd, if not tactfully harsh, business practice. While organizations continue to decrease their workforce in an effort to regain acceptable profit margins, cut back on “waste” and become “leaner”, they also stress the importance of sharing knowledge among employees and building organizational memory. How can a company effectively share knowledge and build organizational memory when its employee base is shrinking? This is an interesting question that has stirred much debate over recent years, both in the public and private sector. As such, this book chapter attempts to explore the paradoxical relationship between downsizing (brain-drain) and building organizational memory (brain-gain).


2019 ◽  
Vol 20 (3) ◽  
pp. 652-683 ◽  
Author(s):  
ADRIAN R. BAILEY ◽  
ANDREW ALEXANDER ◽  
GARETH SHAW

Queues are part of everyday routine and experienced by most shoppers, yet little attention has been given to providing historical accounts of queuing as a consumer task or as a shopper experience. This paper examines grocery shop queues and the changing experience of shoppers in historical perspective, specifically focusing upon the shift from counter-service to self-service grocery formats in Britain from 1945 to 1975. The paper draws upon a wide range of material using evidence from oral histories and witness groups, which is supported by contemporary sources from the Mass Observation Archive, newspapers, shopper surveys, and trade publications and reports. The conceptual framework developed in the paper explores the public and private dimensions of queues to consider the experiences and perceptions of shoppers during a period of rapid change in the retail grocery system. More generally, the paper contributes to our understanding of how management innovations are connected to untraded public values.


2008 ◽  
Vol 25 (2) ◽  
pp. 115-118
Author(s):  
Anita Mir

M. A. Muqtedar Khan’s (ed.) Islamic Democratic Discourse: Theory,Debates, and Philosophical Perspectives examines how Muslim thinkershave and are trying to formulate systems for good and ethical self-governanceand the necessity, therein, for political discourse. The debates in theseessays, which span a wide range of subjects and periods, are held togetherby a common principle: political discourse has a long standing in theMuslim world. Given that the Muslim world’s conventional image is one inwhich autocratic regimes prevail, the significance of this argument, presentedhere from its theological, legal, and regional perspectives, is of greatimportance. For political discourse to be meaningful – that is, for it to be an exercisein the clarification and exchange of ideas and to lead, in some instances, toaction – requires that it take place both in the public and private sphere. Thepublic sphere may be more readily recognized as the proper space forpolitical discourse. However, the slippage of political discourse over to theprivate sphere is also of great value in that it indicates two things: first, politicalideas are recognized as important to both a person’s collective and individualsensibilities and, second, while political discourse is expounded in thepublic sphere, its ideas are often first worked out and subsequently reflectedupon in the private sphere ...


2021 ◽  
Vol 2074 (1) ◽  
pp. 012041
Author(s):  
Rui Wang ◽  
Yingxian Chang ◽  
Lei Ma ◽  
Hao Zhang ◽  
Xin Liu ◽  
...  

Abstract Now the computer has been completely towards the public, the network in daily life is more and more widely used, but at the same time, the potential network security problems are also more and more serious. Some sophisticated computer people in order to make money, crack other personal users or company information, a variety of network attacks one after another. Cyber attack has become an extremely feared existence for ordinary people because of its wide range of attacks, strong attack force and obvious hiding effect, which seriously threatens the security of personal information network. If attacked by this kind of attack, the loss borne by each person or company is immeasurable. In order to maintain network security, the defense system is also improving day by day, and finally presents software. This paper mainly makes a detailed understanding of the border attack and defense system, and analyzes the main reasons and inevitability of the software of the border attack and defense system.


Author(s):  
Abdul Rajak ◽  
Vilas H. Gaidhane ◽  
Aaron D’costa

Background: Network security is used to secure data transmission over the wireless network. Encryption of information plays a vital role in communication since it protects the sender and receiver from the hackers trying to access the information. Objectives: In recent years, protecting the information data has become a challenging task for the researchers. Hence, there is a need to improve the existing methods of secure data transmission. Method: In this paper, a new approach is proposed to implement a better security chip for secured data transmission. It is based on the combination of encryption and description as well as the compression techniques. The proposed design focuses on the reduction of delay in the circuit using the compression approach. Results: The various simulations are carried out using the Xilinx, and MATLAB software. The timing signals are observed on Xilinx and the proposed algorithm has been simulated and tested on MATLAB. Conclusion: The presented approach performed better and achieved a good compression ratio and hence the loss of information was less at the receiving end.


2013 ◽  
Vol 380-384 ◽  
pp. 3934-3937
Author(s):  
Jian Long Huang ◽  
Zhong Feng Wang ◽  
Li Gang Li ◽  
Ying Nan Wang ◽  
Wei Chun Ge

Based on the rapid development of communication technology and a large area of the base station of the public network being laid, which prompting the data transmission device development that base on the GPRS wireless network. This paper describes the hardware design of a data transmission device which based on GPRS mobile communication technology. Extended remote data transmission via GPRS mobile communication technology applications, and has broad application prospects.


Sign in / Sign up

Export Citation Format

Share Document