Personal Information
Occupation
Software Engineer
Industry
Technology / Software / Internet
Tags
security
science
software
analysis
defense in depth
cryptography
decryption
encryption
network vulnerabilities
malicious websites
email attachments
how malware spreads
reactive measures
intrusion monitoring
intrusion monitoring and detec
preventive measures
malicious software
compromising the target
types of attachks
prevention
post attack
implications
methods for security
cyber era
attack
reconnaisance
approximations
probability
bounds
paradox
birthday
storage
hash
definitions
cryptanalysis
function
math
engineering
evm opcode
evm
dapps
ethereum
vulnerability assessment
decentralized
smart contract
development
wallet
transactions
vulnerabilities
check for smart contract
bytecode
fortification
contract
blockchain
privacy
security at the network
multiple layers
a holistic approach
always verify
never trust
privacy-preserving design
end-to-end security
zero-trust security
advanced communication systems
deployment and operation
efficiency
safety of 5g network physical
5g wlan security
physical layer security
cyber security business models
design principles
5g
database project
project in database
project management
projects
final year
final
private key
public key
keys
database
authendication
polynomial
chebyshev
chaos
ecdsa
technology
biofilters
biology
calorific values
c.r.rao
mathematics
famous indian mathematician
indian mathematician
indian mathematician :c.r.rao
See more
- Presentations
- Documents
- Infographics