Preview

Pre Phd Syllabus Hntuk

Satisfactory Essays
Open Document
Open Document
742 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Pre Phd Syllabus Hntuk
prephdsyllabus
D.SRINIVAS
10022PO538 Paper I - Subjects

R10PPCSG1.1 Advanced Databases

R10PPCSG1.2 Artificial Intelligence & Soft Computing

R10PPCSG1.3 Code Optimization

R10PPCSG1.4 Data Mining & Knowledge Discovery

R10PPCSG1.5 Digital Image Processing

R10PPCSG1.6 Distributed Computing

R10PPCSG1.7 Distributed Databases

R10PPCSG1.8 Distributed Operating System

R10PPCSG1.9 ERP & Supply Chain Management

R10PPCSG1.10 Human Computer Interaction

R10PPCSG1.11 Information Retrieval

R10PPCSG1.12 Multi-Media Application Development

R10PPCSG1.13 Network Security

R10PPCSG1.14 Object Oriented Software Engineering

R10PPCSG1.15 Soft Computing

R10PPCSG1.13 NETWORK SECURITY

Unit I: Introduction to Network Security:

Attacks, services, Security. A model of Inter network Security, Steganography, One time PADS.

Unit II: Basic and ESOTERIC Cryptographic Protocols:

Key Exchange, Authentication, Formal Analysis of Authentication and key Exchange Protocols, Multiple & Public Key Cryptography, Secret Splitting & Sharing Secure elections, Secure multiparty, Communication, Digital Cash.

Unit III: Crypto Graphic Algorithms (Block Cipher):

RC2, GOST, CAST, BLOW FISH, SAFEER, RC5, NEWDES, CRAB, Theory of Block Cipher design.

Unit IV: Key Management:

Key lengths, Generating Keys, Transferring, Verification, Updating, Storing, Backup, Compromised, Lifetime of, Destroying Keys, Public key Management.

Unit V: Digital Signature Algorithms:

Digital Signature, DSA, DSA variants, Gost, Discrete Lagorithm, One – Schnorr – Shamir digital Signatures, Esign, Cellular Automata.

Unit VI: Mails:

Electronic Mail & IO Security good Privacy, SIMIME, IP Security Architecture, Authentication Header, Encapsulating Security, Pay load Key Management Issues.

Unit VII: Security:

Web Security Web Security requirements, Secure Sockets

You May Also Find These Documents Helpful

  • Good Essays

    There are two components to this course: lecture and activity. This class provides facts about exercise, physical fitness, nutrition and other areas of wellness. The purpose of this course is to educate students about the six dimensions of wellness with particular emphasis on physical wellness.…

    • 2383 Words
    • 10 Pages
    Good Essays
  • Good Essays

    References: Ballad, B. Ballad, T. and Banks, Erin. Access Control, Authentication, and Public Key Infrastructure. 2011. Jones and Bartlett Learning…

    • 575 Words
    • 2 Pages
    Good Essays
  • Good Essays

    1)Data protection: Ensure all information is stored in a secure place and no information is given out if unsure.…

    • 1527 Words
    • 7 Pages
    Good Essays
  • Good Essays

    Cryptography

    • 385 Words
    • 2 Pages

    Answer the following questions by filling in the blank using the proper technology or cryptography terms you have learned in class:…

    • 385 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Course Syllabus

    • 3882 Words
    • 16 Pages

    University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality.…

    • 3882 Words
    • 16 Pages
    Powerful Essays
  • Good Essays

    Cited: Ballad, B. B. (2011). Access Control, Authentication, and Public Key Infrastructure. Burlington: Jones & Bartlett Learning.…

    • 630 Words
    • 3 Pages
    Good Essays
  • Good Essays

    A secure and efficient protocol is used, ECC elliptic curve cryptography a public key cryptography…

    • 470 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    SAMPLE Security Policy

    • 3395 Words
    • 13 Pages

    References: Hausman, K., Weiss, M., & Barrett, D. (2011). Comptia security sy0-301. (3rd ed.). Pearson Education, Inc.…

    • 3395 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    is3230 week1 assgnmnt1

    • 362 Words
    • 3 Pages

    References: Ballad, Bill, Tricia Ballad, and Erin K. Banks. 2011. Access Control, Authentication, and Public Key Infrastructure. Sudbury: Jones & Bartlett Learning.…

    • 362 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Cac Card

    • 1716 Words
    • 7 Pages

    Public key infrastructure (pki) certificates that enable cardholders to "sign" documents digitally, encrypt and decrypt emails, and establish secure online network connections.…

    • 1716 Words
    • 7 Pages
    Good Essays
  • Good Essays

    In this document I am going to explain the security issues that every e-commerce possible faces and how to overcome them.…

    • 646 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Kendall, J., Dr. (2008, June). Cryptographic Techniques for Network Security. University of Portsmouth. Retrieved from https://learn.umuc.edu/d2l/le/content/57178/viewContent/2562147/View.…

    • 1135 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Public Key Infrastructure

    • 2320 Words
    • 10 Pages

    This paper is intended to show the importance using a Public Key Infrastructure (PKI). PKI is a broad subject matter and is constantly evolving to meet the growing demands of the business world. This paper will address PKI at a relatively high-level and will not include details regarding the underlying cryptography (Weise, 2001). This paper will cover the history behind PKI, why we should us PKI, its purposes and functions how PKI works.…

    • 2320 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    usrt

    • 392 Words
    • 2 Pages

    Encryption can be a useful deterrent in keeping sensitive information out of the hands of those not authorized and for maintaining the security of a network. Some encryption schemes utilize a secret key and a public key. Each person on the protected network has both a public and a secret key. Everyone who wants to be able to send encrypted information to another person on the network uses the public key. The recipient then uses a secret key to decrypt the information sent. A user must have a secret key to unlock the information.…

    • 392 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Mdu Syllabus

    • 12126 Words
    • 49 Pages

    SCHEME OF EXAMINATION AND SYLLABUS FOR B. ED. COURSE PART I: THEORY (PAPERS I- VII)…

    • 12126 Words
    • 49 Pages
    Satisfactory Essays