Software Quality Assurance in Network Security Using Advanced Cryptographic Techniques

Authors

  • Tarannam Zaffar fatima jinnah women university the mall road rawalpindi pakistan

Keywords:

analysis, summaries, networksecurity, cryptography, quaity assurance

Abstract

Restricted access! Kindly consult the site administrator. 

Author Biography

Tarannam Zaffar, fatima jinnah women university the mall road rawalpindi pakistan

Department of software engineering

References

M. Sirshar and Dr.F.Arif “Evaluation of Quality assuranceFactors in Agile Methodologies”, February-2012

http://searchstorage.techtarget.com/definition/data-availability

http://whatis.techtarget.com/definition/Confidentiality-integrity-and-availability-CIA

http://kedar.nitty-witty.com/blog/software-quality-attributes-parameters explained#sthash.lqvAV1DO.dpuf

http://kedar.nitty-witty.com/blog/software-quality-attributes-parameters explained#sthash.lqvAV1DO.dpuf

V.Daza, J.Herranz, P.Morillo and C.Ra`fols,”Cryptographic techniques for mobile ad-hoc networks”,26 August 2007.

A. J.Raphaeland Dr. V.Sundaram.,”Secured Communication through Fibonacci Numbers and Unicode Symbols”, International Journal of Scientific & Engineering Research ,Volume 3, Issue 4, April-2012.

R.Y.Rao, R Swetha and P.Ramanjaneyulu,”SECURE VISUAL CRYPTOGRAPHY”, International Journal of Scientific & Engineering Research ,Volume 4, Issue3, March-2013.

A.Kaur,”Energy Analysis of Wireless Sensor Networks using RSA and ECC Encryption Method”,International Journal of Scientific & Engineering Research,Volume 4, Issue 5, May-2013.

M.S. Sharbaf,”Quantum Cryptography: An Emerging Technology in Network Security”, 978-1-4577-1376-7/11/$26.00 ©2011 IEEE.

S.Goyal,”A Survey on the Applications of Cryptography”,International Journal of Science and Technology,Volume 1 No. 3, March, 2012.

S.V.Gunti”,Secure Key Exchange ThroughElgamalCryptosystem InAdhoc Networks”,

International Journal of Scientific & Engineering Research ,Volume 5, Issue 4, April-2014

D.L.Cook, J.Ioannidis and A.D.Keromytis,”Secret Key Cryptography Using Graphics Cards”,January 14, 2004.

M.Panda,”Security in Wireless Sensor Networks using Cryptographic Techniques”,

American Journal of Engineering Research (AJER) ,Volume-03, Issue-01, pp-50-56,2014.

T.Duong and J.Rizzo,”Cryptography in theWeb: The Case of Cryptographic Design Flaws in ASP.NET”, 2011 IEEE Symposium on Security and Privacy.

G.A.V.Rama,C.Rao, P.V.Lakshmi and N.R.Shankar,“A New Modular Multiplication Method in PublicKey Cryptosystem”, International Journal of Network Security, Vol.15, No.1, PP.23-27, Jan. 2013.

R.Sinha, H.k.Srivastava and S.Gupta,”Performance Based Comparison Study of RSA

and Elliptic Curve Cryptography”,International Journal of Scientific & Engineering Research,Volume 4, Issue 5, May-2013.

N.Kaur et al, “Enhancement of Network Security Techniques using Quantum Cryptography”,International Journal on Computer Science and Engineering (IJCSE), Vol. 3 No. 5 May 2011.

F.Bao and P.Samarati,J.Zhou,”Applied Cryptography andNetwork Security”, 10th International Conference, ACNS 2012 Singapore, June 26-29, 2012.

M. Alimohammadi and A. A. Pouyan,”Performance Analysis of Cryptography Methods for Secure Message Exchanging in VANET”, International Journal of Scientific & Engineering Research,Volume 5, Issue 2, February-2014.

S.Kaushik and A.Singhal, ”December 2012.Network Security Using Cryptographic Techniques”,

International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 12.

G.Gupta and R.Chawla ,” Network Security: Attacks, Tools and Techniques” ,International Journal of Advanced Research in Computer Science and Software Engineering ,Volume 2, Issue 7, July 2012.

S.Ghansela ,“Network Security: Attacks, Tools and Techniques”,International Journal of Advanced Research in Computer Science and Software Engineering ,Volume 3, Issue 6, June 2013.

S.SHAKTI, ”Encryption Using Different Techniques”,International Journal in Multidisciplinary and Academic Research (SSIJMAR),vol. 2, No. 1, January-February-2013.

N.Jirwan, A.Singh and Dr.S.Vijay, ”Review and Analysis of Cryptography Techniques”,International Journal of Scientific & Engineering Research,Volume 4, Issue3, March-2013.

Published

2016-07-07

How to Cite

Zaffar, T. (2016). Software Quality Assurance in Network Security Using Advanced Cryptographic Techniques. International Journal of Computer (IJC), 21(1). Retrieved from https://ijcjournal.org/index.php/InternationalJournalOfComputer/article/view/357

Issue

Section

Articles