Friday, April 5, 2019

Online examination system Essay Example for Free

Online examination system EssayThe cellular concept, cellular frequency planning, link control, handoffs, power control, traffic capacity, propagation modelling, digital transmission techniques, fading mitigation, multiple access techniques, radio receiver networking, examples of current and future wireless standards.Introduction and overview (1 Lecture)Introduction to Cryptography (2 lectures)Terminology steganography, substitution and transformation figures, XOR,one-time pads, communications protocol Building Blocks (3 Lectures)Communications using symmetric cryptography, one-way hash functions, communications using public-key cryptography, digital signatures, rudimentary Protocols (2 lectures)Key exchange, authentication, secret splitting, secret sharing, cryptographic protection of informationbases, IntermediateProtocols (2 lectures)Time stamping services, subliminal channel, undeniable digital signatures, Key Length (2 lecture)Symmetric key length, public-key key length, comp aring symmetric and public-key key length, Key charge (3 Lectures)Generating keys, transferring keys, verifying keys, using keys, updating keys, storing keys, compromised keys, lifetime of keys, destroying keys, public key management,Algorithm Types and Modes (10 Lecture)Electronic codebook mode, block replay, cipher block chaining mode, stream ciphers, cipher-feedback mode, output feedback mode, choosing a cipher mode, block ciphers vs. stream ciphers, Choosing an Algorithm, Choosing an algorithm, public-key vs. symmetric cryptography, encrypting communication channels, encrypting data for storage, security Models, Windows, Linux, Web, Cookies, Biometrics (gummy fingers), Tempest, Viruses, Firewalls, System/Comprehensive Security AnalysisText Book/sStallings, W and Brown, L., Computer Security principles and practice, 2nd edition, 2011Reference MaterialWilliam Stallings, Cryptography and Network Security, 4th Edition, 2005, ISBN-13 978-0131873162 Kaufman, Perlman, Speciner, Ne twork Security Private Communication in a Public World, 2nd Edition, Prentice Hall, 2002, ISBN-13 978-0130460196Other books will be used in the course if necessary.Department Of Computer Science Information Technology, HIC Jauharabad Campus Instructional Aids/Resources judicial decision CriteriaClassAssessment35%Quizzes and Test15Assignment and Presentations10Attendance and Class Participations 5Assignments + QuizzesMid25%If RequiredFinal40%If RequiredTotal100%

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.