A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is
A significant growth is observed in network technology during last few decades. Several kinds of information services are delivered using the networks. Additionally, both legitimate and malicious users are accessing the services. Moreover, the network is always vulnerable to different kinds of security issues. Therefore the domain of security is an essential aspect of the study, research, and development. For that purpose, the efforts are made to design effective security protocols. Duringdoi:10.5120/ijca2017914870 fatcat:lef6wexgojgavov3yh3avlco5a