Home

  1. Microprocessor Systems
Assembly Language Code


      2. Theory of Computation



      3. Cryptography & Network Security


Link to my publications:

An optimized steganographic technique
http://link.springer.com/article/10.1007/s40012-016-0116-x
(Cite this article: Dwivedi, S. CSIT (2016). doi:10.1007/s40012-016-0116-x)

On the applicability of Diploid Genetic Algorithms in Vertex Cover Problem
http://link.springer.com/article/10.1007/s40012-016-0113-0
(Cite this article: Amini, M., Dwivedi, S. & Beg, M.A. CSIT (2016). doi:10.1007/s40012-016-0113-0)

A Steganography Technique Based on the Huffman Codes and PM1 Technique
http://www.ijarcs.in/index.php/Ijarcs/article/view/3542
(Cite this article: Dwivedi, S., & Nafis, M. T. (2017). A Steganography Technique Based on the Huffman Codes and PM1 Technique. International Journal8(5).)

4 comments:

  1. Security software can be configured to update multiple times a day if the need be; hardware updates usually consist of firmware upgrades and an update wizard much like that present within the software application.

    network security

    ReplyDelete
  2. Paying network administrators to defend the integrity of your network is an expensive proposition - much more so than installing the proper security solution that your network requires.

    utm network security

    ReplyDelete
  3. Wonderful article, Thank you for sharing amazing blog write-ups.

    You can also check out another blog on Cryptography and Network Security

    ReplyDelete
  4. Thank You! for sharing the article and helping us with ease of searching the notes. We are ezyschooling and we appreciate the post you have created. Keep up the good work.

    ReplyDelete