2009 Second International Conference on Emerging Trends in Engineering &Amp; Technology 2009
DOI: 10.1109/icetet.2009.180
|View full text |Cite
|
Sign up to set email alerts
|

Pluggable Encryption Algorithm In Secure Shell(SSH) Protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2010
2010
2015
2015

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…In 2005, researchers explored the limitations of PKn and highlighted the issues which can put the network in danger [6]. Between 2005 and 2010, most of the papers worked on the encryption method for port sequence [2,7].…”
Section: Related Workmentioning
confidence: 99%
“…In 2005, researchers explored the limitations of PKn and highlighted the issues which can put the network in danger [6]. Between 2005 and 2010, most of the papers worked on the encryption method for port sequence [2,7].…”
Section: Related Workmentioning
confidence: 99%
“…Secure Shell (SSH) protocol is employed to establish the communication channel between the mobile device and the cloud. SSH protocol [7] uses the public/private key authentication technique to verify the end nodes.…”
Section: A Establishing Channelmentioning
confidence: 99%