Indian Journal of Science and Technology
DOI: 10.17485/ijst/2016/v9i30/98718
Year: 2016, Volume: 9, Issue: 30, Pages: 1-6
Original Article
K. Jaya Rohit, M. Siva Rama Krishna, C. H. Geetha Krishna and P. S. G. Aruna Sri*
Department of ECM, [email protected]
[email protected]
[email protected]
[email protected]
*Author for correspondence
Aruna Sri
Department of ECM
Email:[email protected]
Background/Objectives: State the objectives of your work clearly. Methods/Statistical Analysis: State the methodology you employed to meet the objectives. Findings: Rewrite your findings. Application/Improvements: Here we are using mobile users and authentication server. Authentication server is uploaded with SQL server which help to store the user ID and password of the mobile users.
Keywords: Authentication Server, Cryptography, Decryption, Encryption, End-to-End Communication, Security
Subscribe now for latest articles and news.