Neural Networks and Rules-based Systems used to Find Rational and Scientific Correlations between being Here and Now with Afterlife Conditions
Neural Networks and Rules-based Systems used to Find Rational and
Article Fingerprint
ReserarchID
YRACM
Wireless Local Area (WLAN) has become a hot spot of application in the field oftelecommunication these years. To secure WLAN for data transmission, RC4 algorithm is able to provide the advantages of fast performance in the resource constrained environment. This paper analyzes the security of RC4 algorithm, presents a way to enhance the security of RC4 algorithm and analysis the affection of the enhanced algorithm by using MD5/hash function.
Dr. Laxmimounika.Nannaka. 2012. \u201cRemodelling RC4 algorithm for secure communication for WEP/WLAN protocol\u201d. Global Journal of Research in Engineering - F: Electrical & Electronic GJRE-F Volume 12 (GJRE Volume 12 Issue F5): .
Article file ID not found.
Crossref Journal DOI 10.17406/gjre
Print ISSN 0975-5861
e-ISSN 2249-4596
The methods for personal identification and authentication are no exception.
The methods for personal identification and authentication are no exception.
Total Score: 108
Country: India
Subject: Global Journal of Research in Engineering - F: Electrical & Electronic
Authors: Dr. Laxmimounika.Nannaka, Hepzybah.Singarapu, Ramadevi.Puli (PhD/Dr. count: 1)
View Count (all-time): 169
Total Views (Real + Logic): 5562
Total Downloads (simulated): 2802
Publish Date: 2012 05, Thu
Monthly Totals (Real + Logic):
Neural Networks and Rules-based Systems used to Find Rational and
A Comparative Study of the Effeect of Promotion on Employee
The Problem Managing Bicycling Mobility in Latin American Cities: Ciclovias
Impact of Capillarity-Induced Rising Damp on the Energy Performance of
Wireless Local Area (WLAN) has become a hot spot of application in the field oftelecommunication these years. To secure WLAN for data transmission, RC4 algorithm is able to provide the advantages of fast performance in the resource constrained environment. This paper analyzes the security of RC4 algorithm, presents a way to enhance the security of RC4 algorithm and analysis the affection of the enhanced algorithm by using MD5/hash function.
We are currently updating this article page for a better experience.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.