Parul University Digital Repository

Constraints of 3C Application for Packet Encryption

Show simple item record

dc.contributor.author Rana, Harshika
dc.contributor.author Dahiya, Vishal
dc.date.accessioned 2020-11-11T10:49:01Z
dc.date.available 2020-11-11T10:49:01Z
dc.date.issued 2018-11
dc.identifier.issn 2321-7782
dc.identifier.uri http://ir.paruluniversity.ac.in:8080/xmlui/handle/123456789/7707
dc.description.abstract Any innovative approach is end result of solving hurdles which were arising during research work. These hurdles are nothing but some limitations or constraints which indicate us for dead end and thus researcher will try to find new way to solve problem. For 3C: Customized Cascaded Cryptography application on packet in real mean will be very difficult. There were few constrains arise in terms of firewall policy, Commands and Encryption Policy. Finally it will conclude in own customized tool to be developed for application of 3C concepts for packet encryption. en_US
dc.language.iso en en_US
dc.publisher International Journal of Advance Research in Computer Science and Management Studies | Volume-6 | Issue-11 en_US
dc.subject Firewall policy en_US
dc.subject Encryption Policy en_US
dc.subject Commands en_US
dc.subject 3C en_US
dc.subject Customized en_US
dc.subject Cascaded en_US
dc.subject Cryptography en_US
dc.subject router en_US
dc.subject Ipsec en_US
dc.subject Security en_US
dc.subject SSL en_US
dc.subject IP, TCP en_US
dc.subject Header en_US
dc.subject Security Header en_US
dc.title Constraints of 3C Application for Packet Encryption en_US
dc.type Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account