Search
Skip to Search Results-
2022-03-01
Abstract: Cryptocurrency has emerged as one of the widely used applications based on Blockchain. This report intends to provide an overview of Cryptocurrency, Blockchain, Cryptographic hashing, Public key encryption and Quantum computer subjects. The report will touch upon various technologies...
-
2021-01-01
As the Internet is evolving, transporting information through the Internet requires security to be an aspect to deal with. In a typical distribution, all of the traffic transmitted over the public network (Internet) is secured, but security practice states that the internal traffic must also be...
-
2021-01-01
Multi-Factor Authentication is an authentication system that verifies the user’s identity based on multiple factors of authentication, such as ‘something you know’, ‘something you have’ and ‘something you are’. It provides better security as compared to an authentication system that employs only...