scholarly journals A Secure Electronic Messaging System in Client Server Cryptography-RSA Algorithm

The potency and effectiveness of the knowledge systems, in some ways, rely upon its design and the way knowledge area unit transmitted among totally different parties. Similarly, a really crucial side within the computer code development is that the security of knowledge that flows through open communication channels. one in all the foremost widespread design is client/server design that creates the centralization of knowledge storage and process modify, and supply flexibility for applying authentication strategies and coding algorithms inside info systems. whereas the amount of shoppers increase, its need increasing the authentication and coding level as high as potential. Client/server could be a technology that enables to open associate degree interactive session between the user's browser and also the server. during this study, we tend to used client/server design to accomplish secure messaging/chat between shoppers while not the server having the ability to decode the message by applying 2 layer security: one layer of coding between the shoppers and also the server, and also the second layer of coding between the shoppers within the chat space. during this manner, a shopper / Server Cryptography- based mostly Secure electronic messaging System mistreatment RSA (Rivest- Shamir-Adelman), that could be a wide used public-key cryptography and authentication system for encryption of digital electronic messaging transactions like email over the computer network, extranet and net, to write in code and decipher messages in an exceedingly terminal window is developed.

2019 ◽  
Vol 2 (1) ◽  
pp. 4
Author(s):  
Mr. Musawarman

This research aims to analyze and develop a system for monitoring computer infrastructure management in real time (real-time monitoring). The developed system was a distributed system that would help IT Administrators work at the Center for Computing and Information Technology Faculty of Engineering Universitas Indonesia (CCIT FTUI) to monitor the computer infrastructure in real-time. The Real - time referred to system that was able to do direct monitoring to computer infrastructure, and quickly able to transmit data status of the device. Limitations of the current monitoring process was that the IT Administrator checks directly into the computer lab room if there were problems related to a computer or cable that was not connected from the computer system based on a report from teachers or students.         The developed monitoring system was a client/server based system that used network infrastructure so that the computer infrastructure could be optimally monitored. The modules used in this research are computer input and output modules, and installed applications or system services. This research is expected to be able to overcome the problems associated with computer infrastructure’s performance, conduct supervision and centralized control in helping the problems that often occur during learning process or examination. Keywords: Monitoring, Computer Infrastructure Management, Distributed System, Computer Network, Real-time.


2019 ◽  
Vol 3 (1) ◽  
pp. 106
Author(s):  
Muhammad Sabir Ramadhan

ABSTRACT- This study aims to design interactive multimedia for computer client server programming with Android-based so that it can be accessed via smartphone. Client server programming course is one of compulsory subjects in Informatics Engineering course. With the realization of multimedia is expected to shorten the learning time of students, and students can more easily understand the material of client server programming rather than through the tutorial tutorial as usual, and is expected to improve learning achievement. This multimedia realization chose to use the Android operating system to be accessible through smartphone that is currently widely used by the students. This interactive multimedia presents theories, simulations and problems as the evaluation of client server programming learning. The results of this interactive multimedia will be tested through the test instrument to the students on the study program of Informatika Technique of Asahan University. Instrument test used to know student achievement. Test instrument used is a questionnaire instrument to determine the quality of interactive multimedia computer network courses. Multimedia is designed using the main software such as Macromedia Flash, Macromedia Director, and Macromedia Authorware and Eclipse 4.2 along with supporting applications. The material to be delivered on interactive multimedia is tailored to the syllabus of client server programming courses on Strata 1 level. The expected research output is in the form of teaching materials for the enrichment of client server programming subjects and multimedia technology and will be socialized through the national seminar in the field of informatic engineering. Keywords - interactive multimedia, Android, client server programming


2021 ◽  
Author(s):  
Jahangir Abbas Mohammed

This paper proposes a secure two-factor authentication (TFA) system that relies on a password and a crypto-capable device. In cases like a compromise of communication lines, server or device vulnerabilities, and offline and online attacks on user passwords, the approach provides the highest feasible security bounds given the collection of compromised components. Using either SAS Message Authentication or any PIN-based Authentication, the suggested approach constructs a TFA scheme. The paper also proposes a secure software architecture for implementing an enhanced public key cryptography system for mobile applications and an efficient implementation of this modular structure that can use any password-based client-server authentication method without relying on risky single- layer password authentication architecture.


2019 ◽  
Author(s):  
Bayu Kurniawan

Computer network connection is a fundamental thing in a network because if a connection is problematic, then all types of applications that run through a computer network cannot be used. Cisco Packet Tracer can be used for simulations that reflect a picture of the computer network connection on the network system used. This paper designs two designs, namely the design with a star topology from one server using Cisco Packet Tracer software and connecting networks between computers. The results of this study are the connection between computer networks. This study was conducted to find out whether the server and client computers can communicate with each other


2009 ◽  
pp. 1454-1461
Author(s):  
Oghenevwogaga Benson Adogbeji ◽  
Esharenana E. Adomi

The convergence of information and communication technology as embodied in the Internet has transformed the present day society into a knowledge society. Earlier, information and knowledge were passed by word of mouth or through manuscripts, and communication was a slow process, but today information is passed from one individual to an infinite number of other users through a number of media and formats which makes rapid and widespread dissemination of information possible (Preeti, 2006). This information dissemination has been so easy today due to the advent of computer network. Computer network is the interconnection of two or more computers for the purpose of sharing resources; this may involve the sharing of common database, software, printer etc. In networking, one may use peer-to-peer model or the client/server model. The peer-to-peer model is a decentralized networking model, which means all account administration is local to each machine and each machine maintains its own account database. In this model, each computer is equal or “peer” of the others. None of the members has total control over the others. This networking may involve the use of hub if the systems are more than two but none of the workstation has total control of the others. However, client/server type of network model is the type of network model, which is defined by the presence of server on the network that provides security and administration of the network. The server enables centralized database security and backup (Adogbeji & Adomi, 2005). In order for the cyber cafés in Nigeria to be able to have access to the entire world and give access to users, there comes the need to network their computers. This they do using client/server model and star topology. This chapter investigates networking patterns in cybercafes in Delta state. It explores the types of network adopted locally, types of networking model adopted in the cafes, reasons for adopting the models, types of networking topology adopted and problems inherited in the networking pattern adopted. Recommendations for improvement are also set forth.


Author(s):  
Oghenevwogaga Benson Adogbeji ◽  
Esharenana E. Adomi

The convergence of information and communication technology as embodied in the Internet has transformed the present day society into a knowledge society. Earlier, information and knowledge were passed by word of mouth or through manuscripts, and communication was a slow process, but today information is passed from one individual to an infinite number of other users through a number of media and formats which makes rapid and widespread dissemination of information possible (Preeti, 2006). This information dissemination has been so easy today due to the advent of computer network. Computer network is the interconnection of two or more computers for the purpose of sharing resources; this may involve the sharing of common database, software, printer etc. In networking, one may use peer-to-peer model or the client/server model. The peer-to-peer model is a decentralized networking model, which means all account administration is local to each machine and each machine maintains its own account database. In this model, each computer is equal or “peer” of the others. None of the members has total control over the others. This networking may involve the use of hub if the systems are more than two but none of the workstation has total control of the others. However, client/server type of network model is the type of network model, which is defined by the presence of server on the network that provides security and administration of the network. The server enables centralized database security and backup (Adogbeji & Adomi, 2005). In order for the cyber cafés in Nigeria to be able to have access to the entire world and give access to users, there comes the need to network their computers. This they do using client/server model and star topology. This chapter investigates networking patterns in cybercafes in Delta state. It explores the types of network adopted locally, types of networking model adopted in the cafes, reasons for adopting the models, types of networking topology adopted and problems inherited in the networking pattern adopted. Recommendations for improvement are also set forth.


Sign in / Sign up

Export Citation Format

Share Document