Professional Documents
Culture Documents
RegisterationNumber
Name
11101616 Ankita Aggarwal 11109321 Ajay Kumar Gupta 11100620 Tariq Ahmad Ganie 11100617 Majid Ali 11104732 Khalid Gowher Ahmad
6 7 8 9
11103506 Subha Santi Bidhayak Pradhan 11110637 Sameeksha Sudi 11109214 Ajeet Jaiswal 11104731 Khalid Gulzar
10
RQ3104A16
11
RQ3104A17
12
RQ3104A18
13
11103853 Akata
RQ3104A19
14
RQ3104A39
15
11113925 Akanksha
RQ3104A43
16
RQ3104A44
17
RQ3104A47
18
RQ3104B21
19
RQ3104B22
20
RQ3104B24
21
RQ3104B28
22
RQ3104B29
23
RQ3104B32
24
RQ3104B33
25
RQ3104B34
26
RQ3104B35
27
RQ3104B37
28
RQ3104B38
29
RQ3104B40
30
RQ3104B46
Term Paper Topic Digital signatures Secutity attacks Data encryption standards Advanced Encryption standards Encryption Principles
SNMP
Data Security
Internet Security
Computer Security
Substitution Algorithm
Transposition Algorithms
Intruders
Malicious Softwares
Kerberos
IP Security Architecture
Description Applications and implementation of digital signature,its uses and types of digital signatures Different types of security attacks,prevention from different security attacks analysis of DES alogorithm along with diagrams and examples analysis of AES alogorithm along with diagrams and examples comprehensive study of encryption principles different approaches Diffent types of firewalls.how they are implemented?requirements to install firewall.their applications Applications and implementation of web security.different mechanisms of web security Applications and implementation of different e-mail security mechanisms Applications and implementatioon of different IP level securoity mechanisms simple network management protocol description and implemetation and applications of the protocol.comprehensive study of protocol Applications,implementation,issues and different mechanisms that are used along with suitable diagrams Applications,implementation,issues and different mechanisms that are used along with suitable diagrams Applications,implementation,issues and different mechanisms that are used along with suitable diagrams Applications,implementation,issues and different mechanisms that are used along with suitable diagrams Applications,implementation,issues and different mechanisms that are used along with suitable diagrams Applications,implementation,issues and different mechanisms that are used along with suitable diagrams Applications,implementation,issues and different mechanisms that are used along with suitable diagrams Applications,implementation,issues and different mechanisms that are used along with suitable diagrams Applications,implementation,issues and different mechanisms that are used along with suitable diagrams
Applications,implementation,issues and different mechanisms that are used along with suitable diagrams Applications,implementation,issues and different mechanisms that are used along with suitable diagrams Applications,implementation,issues and different mechanisms that are used along with suitable diagrams Applications,implementation,issues and different mechanisms that are used along with suitable diagrams Applications,implementation,issues and different mechanisms that are used along with suitable diagrams Applications,implementation,issues and different mechanisms that are used along with suitable diagrams Applications,implementation,issues and different mechanisms that are used along with suitable diagrams Applications,implementation,issues and different mechanisms that are used along with suitable diagrams Applications,implementation,issues and different mechanisms that are used along with suitable diagrams Applications,implementation,issues and different mechanisms that are used along with suitable diagrams Applications,implementation,issues and different mechanisms that are used along with suitable diagrams