dc.contributor.author | Rana, Harshika | |
dc.contributor.author | Dahiya, Vishal | |
dc.date.accessioned | 2020-11-11T10:49:01Z | |
dc.date.available | 2020-11-11T10:49:01Z | |
dc.date.issued | 2018-11 | |
dc.identifier.issn | 2321-7782 | |
dc.identifier.uri | http://ir.paruluniversity.ac.in:8080/xmlui/handle/123456789/7707 | |
dc.description.abstract | Any innovative approach is end result of solving hurdles which were arising during research work. These hurdles are nothing but some limitations or constraints which indicate us for dead end and thus researcher will try to find new way to solve problem. For 3C: Customized Cascaded Cryptography application on packet in real mean will be very difficult. There were few constrains arise in terms of firewall policy, Commands and Encryption Policy. Finally it will conclude in own customized tool to be developed for application of 3C concepts for packet encryption. | en_US |
dc.language.iso | en | en_US |
dc.publisher | International Journal of Advance Research in Computer Science and Management Studies | Volume-6 | Issue-11 | en_US |
dc.subject | Firewall policy | en_US |
dc.subject | Encryption Policy | en_US |
dc.subject | Commands | en_US |
dc.subject | 3C | en_US |
dc.subject | Customized | en_US |
dc.subject | Cascaded | en_US |
dc.subject | Cryptography | en_US |
dc.subject | router | en_US |
dc.subject | Ipsec | en_US |
dc.subject | Security | en_US |
dc.subject | SSL | en_US |
dc.subject | IP, TCP | en_US |
dc.subject | Header | en_US |
dc.subject | Security Header | en_US |
dc.title | Constraints of 3C Application for Packet Encryption | en_US |
dc.type | Article | en_US |