Influence of IPS and AES in Security Region: DOD
Journal: International Journal of Research in Information Technology (IJRIT) (Vol.1, No. 2)Publication Date: 2013-02-28
Abstract
There are so many methods and implementations for developing a secured communication with the users that our located within the security domain. Now days as technologies and number of users is increasing day by day we need to provide high secure for each and every new established connection. But the problem arises when any new communication is established outside the security domain. To avoid this problem, this paper investigates the requirements and technologies for securely sharing information with the tactical user.
Other Latest Articles
- Secure and Energy-Efficient Cooperative Video Distribution over Wireless Networks
- Discrete Walsh-Hadamard Transform in Signal Processing
- A Secure and Robust Authentication Scheme against Pollution Attacks
- Use of Zimmermann Multi Objective Fuzzy Linear Programming model to identify best areas of rice growing in the Dry and Intermediate zones in Sri Lanka
- Serviceable Reactive Programming on Vulnerable Data type
Last modified: 2013-03-04 15:42:57