Secure File Multi Transfer Protocol Design

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure File Multi Transfer Protocol Design

As the internet grows in popularity and therefore also in size more and more transmission takes place mainly because the technology is more readily available and applications have become more user friendly allowing entry to less sophisticated user over a broad spectrum. Most data transfer are mainly text based not secure and vulnerable to various forms of security risks. So the model that uses ...

متن کامل

File Transfer Protocol for Clusters Using Multi Servers

Grid computing is the widely used resource sharing mechanism in the large-scale distributed environment. Data grids are one of the storage resources sharing mechanism in the grid environment. Mirror servers are used for the fault tolerance requirements. Parallel File Transfer Protocol (PFTP) introduces the concept of data transfer using multiple parallel data paths between clusters and mirror s...

متن کامل

Secure File Transfer by using Modular Encryption

Communication is one of the basic necessities of human beings. File transfer is one of the basic forms of communication. Reliability is the key issue raised due to complex nature of network and growth of computer science. In this paper we have devised a technique for file transfer which identifies whether some portion of the file is received corrupt or not, and if yes then exactly what portion ...

متن کامل

Secure Mail Transfer Protocol (SecMTP)

Simple Mail Transfer Protocol (SMTP) is a common protocol for transferring email messages worldwide. SMTP is anonymous and provides only the basic functions required to transfer a message, namely specifying a sender, recipients, and message text. SMTP was designed without consideration for security. We propose a new protocol, Secure Mail Transfer Protocol (SecMTP), to provide user-to-user secur...

متن کامل

Secure Routing Protocol: Affection on MANETs Performance

In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Software Engineering and Applications

سال: 2011

ISSN: 1945-3116,1945-3124

DOI: 10.4236/jsea.2011.45034