JETIREXPLORE- Search Thousands of research papers



Published in:

Volume 5 Issue 12
December-2018
eISSN: 2349-5162

Unique Identifier

JETIRP006011

Page Number

38-39

Share This Article


Title

Security Analysis Using Network Protocol

ISSN

2349-5162

Cite This Article

"Security Analysis Using Network Protocol", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.5, Issue 12, page no.38-39, December-2018, Available :http://www.jetir.org/papers/JETIRP006011.pdf

Authors

Abstract

Network security protocols, such as key-exchange and key-management protocols, are notoriously difficult to design and debug. Anomalies and shortcomings have been discovered in standards and proposed standards for a wide range of protocols, including public-key and Diffie-Hellman–based variants of Kerberos, SSL/TLS, and the 802.11i (Wi-Fi2) wireless authentication protocols. Although many of these protocols may seem relatively simple, security protocols must achieve their goals when an arbitrary number of sessions are executed concurrently, and an attacker may use information provided by one session to compromise the security of another.

Key Words

Network security, key management protocols, wireless authentication.

Cite This Article

"Security Analysis Using Network Protocol", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.5, Issue 12, page no. pp38-39, December-2018, Available at : http://www.jetir.org/papers/JETIRP006011.pdf

Publication Details

Published Paper ID: JETIRP006011
Registration ID: 191772
Published In: Volume 5 | Issue 12 | Year December-2018
DOI (Digital Object Identifier):
Page No: 38-39
ISSN Number: 2349-5162

Download Paper

Preview Article

Download Paper




Cite This Article

"Security Analysis Using Network Protocol", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.5, Issue 12, page no. pp38-39, December-2018, Available at : http://www.jetir.org/papers/JETIRP006011.pdf




Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

0001361

Print This Page