You are on page 1of 6

SerialNo 1 2 3 4 5

RegisterationNumber

Name

RollNumber RQ3104A03 RQ3104A04 RQ3104A05 RQ3104A06 RQ3104A08

11101616 Ankita Aggarwal 11109321 Ajay Kumar Gupta 11100620 Tariq Ahmad Ganie 11100617 Majid Ali 11104732 Khalid Gowher Ahmad

6 7 8 9

11103506 Subha Santi Bidhayak Pradhan 11110637 Sameeksha Sudi 11109214 Ajeet Jaiswal 11104731 Khalid Gulzar

RQ3104A10 RQ3104A12 RQ3104A13 RQ3104A14

10

11110735 Anuj Sharma

RQ3104A16

11

11102707 Sarabjit Kaur

RQ3104A17

12

11110060 Atul Kumar Singh

RQ3104A18

13

11103853 Akata

RQ3104A19

14

11112506 Arun Govind Rao

RQ3104A39

15

11113925 Akanksha

RQ3104A43

16

11113659 Sanjeev Kumar KM

RQ3104A44

17

11113744 Gagan deep singh

RQ3104A47

18

11110999 Bhupinder Kaur

RQ3104B21

19

11111640 Gurbinder Singh

RQ3104B22

20

11112239 Sahil Gupta

RQ3104B24

21

11112106 Hitesh Kumar

RQ3104B28

22

11101196 Smiriti Dubey

RQ3104B29

23

11107768 Navneet Kaur

RQ3104B32

24

11107760 Pawanpreet Kaur

RQ3104B33

25

11112179 Rajinder Kaur

RQ3104B34

26

11101467 Aman Agarwal

RQ3104B35

27

11112198 Manish Sahay

RQ3104B37

28

11111538 Heena Garg

RQ3104B38

29

11113042 Syama Sriram

RQ3104B40

30

11113848 Vivek Kumar Singh

RQ3104B46

Term Paper Topic Digital signatures Secutity attacks Data encryption standards Advanced Encryption standards Encryption Principles

Firewalls Web Security E-mail Privacy IP level Security

SNMP

Man-in-the middles attack

Data Security

Internet Security

Computer Security

Substitution Algorithm

Transposition Algorithms

Key Exchange Algorithms

Message Authentication and Hash functions

Intruders

Malicious Softwares

Hash and MAC algorithm

Elliptical Curve Cryptography

Kerberos

Block Cipher modes of operations

Secure Socket Layer and Transport layer security

Privacy enhancing techniques

Pretty Good Privacy

intrusion Detection system

Security Problems in the TCP/IP Protocol Suite

IP Security Architecture

Description Applications and implementation of digital signature,its uses and types of digital signatures Different types of security attacks,prevention from different security attacks analysis of DES alogorithm along with diagrams and examples analysis of AES alogorithm along with diagrams and examples comprehensive study of encryption principles different approaches Diffent types of firewalls.how they are implemented?requirements to install firewall.their applications Applications and implementation of web security.different mechanisms of web security Applications and implementation of different e-mail security mechanisms Applications and implementatioon of different IP level securoity mechanisms simple network management protocol description and implemetation and applications of the protocol.comprehensive study of protocol Applications,implementation,issues and different mechanisms that are used along with suitable diagrams Applications,implementation,issues and different mechanisms that are used along with suitable diagrams Applications,implementation,issues and different mechanisms that are used along with suitable diagrams Applications,implementation,issues and different mechanisms that are used along with suitable diagrams Applications,implementation,issues and different mechanisms that are used along with suitable diagrams Applications,implementation,issues and different mechanisms that are used along with suitable diagrams Applications,implementation,issues and different mechanisms that are used along with suitable diagrams Applications,implementation,issues and different mechanisms that are used along with suitable diagrams Applications,implementation,issues and different mechanisms that are used along with suitable diagrams

Applications,implementation,issues and different mechanisms that are used along with suitable diagrams Applications,implementation,issues and different mechanisms that are used along with suitable diagrams Applications,implementation,issues and different mechanisms that are used along with suitable diagrams Applications,implementation,issues and different mechanisms that are used along with suitable diagrams Applications,implementation,issues and different mechanisms that are used along with suitable diagrams Applications,implementation,issues and different mechanisms that are used along with suitable diagrams Applications,implementation,issues and different mechanisms that are used along with suitable diagrams Applications,implementation,issues and different mechanisms that are used along with suitable diagrams Applications,implementation,issues and different mechanisms that are used along with suitable diagrams Applications,implementation,issues and different mechanisms that are used along with suitable diagrams Applications,implementation,issues and different mechanisms that are used along with suitable diagrams

You might also like