4 research outputs found

    Secure Database Access and Transfer Using Public Key Cryptography

    Get PDF
    Nowadays many transactions on internet are implemented by security mechanisms.so authentication plays a vital role in securing data, not only in a single process but with varioustransactions.Many security initiatives are defensive strategiesâ€â€aimed at pro tectingthe perimeter of the network. But these works may ignore a crucial Things sensitive data stored on networked servers are at risk from attackers who only need to find one way inside the network to access this confidential information. Additionally, perimeter defenseslike firewalls cannot protect stored sensitive data from the internal threatâ€â€employees with the means to access and exploit this data.Encryption can provide strong security for data at rest, but developing a database encryption strategy must take many factors into consideration.RSA is a rather mature public key algorithm in that itcan be used to encrypt and sign. This paper examines the issues of implementing access and transferring the data using public key cryptog raphy

    A Java Based Network Security on Wireless Network communication

    Get PDF
    Now a day a Wireless networking provides many advantages, but it also integrated with new security threats and alters the organizations overall information security risk profile. Security of data and privacy issu es are important to individuals and organizations especially where exchange of data is done through computer networks. Organizations invest time and resources to reduce the threat and occurrence of data insecurity. Encryption is one of the many methods adopted because of its adaptability to electronic communication channels we are encrypting and decrypting a message from a server to a client, in which the message is encrypted on the server side and decrypt on the client side for some security purposes. Th ough there are many methods to handle such situations like data security encryption plays a vital role. We all see how DES works for countering those threats, when a data is transfer from server to client
    corecore