Online examination system

This essay has been submitted by a student. This is not an example of the work written by professional essay writers.

19 February 2016

Remember! This is just a sample.

You can get your custom paper by one of our expert writers.

Get custom essay

88 writers online

The cellular concept, cellular frequency planning, link control, handoffs, power control, traffic capacity, propagation modelling, digital transmission techniques, fading mitigation, multiple access techniques, wireless networking, examples of current and future wireless standards.

Introduction and overview (1 Lecture)
Introduction to Cryptography: (2 lectures)
Terminology steganography, substitution and transformation ciphers, XOR, one-time pads, Protocol Building Blocks: (3 Lectures)
Communications using symmetric cryptography, one-way hash functions, communications using public-key cryptography, digital signatures, Basic Protocols: (2 lectures)
Key exchange, authentication, secret splitting, secret sharing, cryptographic protection of databases, Intermediate Protocols: (2 lectures)
Time stamping services, subliminal channel, undeniable digital signatures, Key Length: (2 lecture)
Symmetric key length, public-key key length, comparing symmetric and public-key key length, Key Management: (3 Lectures)
Generating keys, transferring keys, verifying keys, using keys, updating keys, storing keys, compromised keys, lifetime of keys, destroying keys, public key management, Algorithm Types and Modes: (10 Lecture)
Electronic codebook mode, block replay, cipher block chaining mode, stream ciphers, cipher-feedback mode, output feedback mode, choosing a cipher mode, block ciphers vs. stream ciphers, Choosing an Algorithm, Choosing an algorithm, public-key vs. symmetric cryptography, encrypting communication channels, encrypting data for storage, Security Models, Windows, Linux, Web, Cookies, Biometrics (“gummy fingers”), Tempest, Viruses, Firewalls, System/Comprehensive Security Analysis

Text Book/s

Stallings, W and Brown, L., Computer Security: principles and practice, 2nd edition, 2011

Reference Material

William Stallings, Cryptography and Network Security, 4th Edition, 2005, ISBN-13: 978-0131873162 Kaufman, Perlman, Speciner, Network Security: Private Communication in a Public World, 2nd Edition, Prentice Hall, 2002, ISBN-13: 978-0130460196

Other books will be used in the course if necessary.

Department Of Computer Science & Information Technology, HIC Jauharabad Campus Instructional Aids/Resources

Assessment Criteria

Quizzes and Test
Assignment and Presentations
Attendance and Class Participations 5
Assignments + Quizzes

If Required:

If Required:



Cite this page

Online examination system. (19 February 2016). Retrieved from

"Online examination system" StudyScroll, 19 February 2016,

StudyScroll. (2016). Online examination system [Online]. Available at: [Accessed: 27 September, 2023]

"Online examination system" StudyScroll, Feb 19, 2016. Accessed Sep 27, 2023.

"Online examination system" StudyScroll, Feb 19, 2016.

"Online examination system" StudyScroll, 19-Feb-2016. [Online]. Available: [Accessed: 27-Sep-2023]

StudyScroll. (2016). Online examination system. [Online]. Available at: [Accessed: 27-Sep-2023]

Don't use plagiarized sources. Get your custom essay..

get custom paper

We use cookies to personalyze your web-site experience. By continuing we’ll assume you board with our cookie policy.