![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextgreen.png)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextred.png)
![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextgreen.png)
![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_open_medium.gif)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextred.png)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_restricted_medium.gif)
A Survey on Network Security Based on Cryptographic Techniques
Subscribe/Renew Journal
Network security is mainly used to provide security for the information which has been transmitted from one party to another party, which should not get accessed by the unauthorised people. This survey provides an overview of network security and the techniques of cryptography through which the security can be provided in all sort of the complete information travelling through networks. The information/data generally passing as a form of packets from one end to another end. Meanwhile how the information's will get protected is the main challenge and it is been protected by the technique called "CRYPTOGRAPHY".
Keywords
Network Security, Unauthorised Access, Packets, Cryptography.
User
Subscription
Login to verify subscription
Font Size
Information
![](https://i-scholar.in/public/site/images/abstractview.png)
Abstract Views: 299
![](https://i-scholar.in/public/site/images/pdfview.png)
PDF Views: 4