Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
computer science topics
Active In SP

Posts: 610
Joined: Jun 2010
28-06-2010, 10:08 PM

As modern encryption algorithms are broken, the world of information security looks in new directions to protect the data it transmits. The concept of using DNA computing in the fields of cryptography and steganography has been identified as a possible technology that may bring forward a new hope for unbreakable algorithms. Is the fledgling field of DNA computing the next cornerstone in the world of information security or is our time better spent following other paths for our data encryption algorithms of the future.
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Active In SP

Posts: 3
Joined: Jan 2011
01-02-2011, 09:24 PM

plss send me ppt i really need it

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Tagged Pages: what is dna computing in security, seminar on dna computing in security, seminar on dna computing and security, dna computing in security, recent application of dna computing in security, ppt of dna computing in security practices, ppt on dna computing in security,
Popular Searches: hr practices, project on hr practices for mba, silage production practices, hr practices of pc hotal, mcdonalds unethical business practices, project report on humanresource practices in humanresource, taining practices in britainnia company,

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Security using colors and Armstrong numbers Moiz ansari 2 145 21-10-2015, 12:10 PM
Last Post: mkaasees
  Wireless Sensor Network Security model using Zero Knowledge Protocol seminar ideas 2 1,411 31-03-2015, 09:08 AM
Last Post: Guest
  security features of atm ppt jaseelati 0 268 16-02-2015, 04:47 PM
Last Post: jaseelati
  abstract cybercrime and security paper presentation jaseelati 0 268 13-02-2015, 02:01 PM
Last Post: jaseelati
  security features of atm abstract jaseelati 0 274 17-01-2015, 04:13 PM
Last Post: jaseelati
  difference between soc and aoc in mobile computing jaseelati 0 310 20-12-2014, 01:12 PM
Last Post: jaseelati
  Cloud Computing abstract seminar tips 4 5,231 20-06-2014, 03:40 PM
Last Post: s.vmurugan@yahoo.com
  Towards Secure and Dependable Storage Services in Cloud Computing FULL REPORT seminar ideas 5 4,110 24-03-2014, 02:51 PM
Last Post: seminar project topic
  Introduction to Cloud Computing project uploader 4 4,624 22-03-2014, 05:27 PM
Last Post: navasfiroz
  Security Framework for Wireless Communications in Smart Distribution Grid seminar tips 2 1,009 28-10-2013, 10:56 AM
Last Post: purplepearls