A Seminar report
On
“Cryptography & Computer Network”
Submitted to
Computer Engineering Department
JAMIA INSTITUTE OF ENGINEERING & MANAGEMENT STUDIES
AKKALKUWA (M.H)
Guided By: Submitted By:
Shaikh Afaque
“Mr. Mohammad Asif”
Assistant Professor
Computer Engineering Dept.
Computer Engineering Department
JAMIA INSTITUTE OF ENGINEERING & MANAG. STUDIES AKKALKUWA(MH)
NORTH MAHARASHTRA UNIVERSITY

More Related Content

PDF
1.front (computer forensic)
PDF
1.front page (biometric security system)
PDF
1 (data security in local network using)
PDF
1.front page (blue eye technology)
PDF
1.frontpage (cyber crime)
DOCX
Raj front
PDF
4.report (gi fi technology)
PDF
3.acknowledgement (gi fi technology)
1.front (computer forensic)
1.front page (biometric security system)
1 (data security in local network using)
1.front page (blue eye technology)
1.frontpage (cyber crime)
Raj front
4.report (gi fi technology)
3.acknowledgement (gi fi technology)

More from JIEMS Akkalkuwa (20)

PDF
2.index (gi fi technology)
PDF
1.frontpage (gi fi technology)
PDF
4 (data security in local network using)
PDF
3 (data security in local network using)
PDF
2 (data security in local network using)
PDF
4.report (biometric security system)
PDF
3.abstact (biometric security system)
PDF
2.index (biometric security system)
PDF
4 (mobile computing)
PDF
3 (mobile computing)
PDF
2 (mobile computing)
PDF
1 (mobile computing)
PDF
4.content (stenography)
PDF
3.abstract (stenography)
PDF
2.index (stenography)
PDF
1.front (stenography)
PDF
4.report (cyber crime)
PDF
3.abstract (cyber crime)
DOCX
Firewall final (fire wall)
DOCX
Certificate (fire wall)
2.index (gi fi technology)
1.frontpage (gi fi technology)
4 (data security in local network using)
3 (data security in local network using)
2 (data security in local network using)
4.report (biometric security system)
3.abstact (biometric security system)
2.index (biometric security system)
4 (mobile computing)
3 (mobile computing)
2 (mobile computing)
1 (mobile computing)
4.content (stenography)
3.abstract (stenography)
2.index (stenography)
1.front (stenography)
4.report (cyber crime)
3.abstract (cyber crime)
Firewall final (fire wall)
Certificate (fire wall)
Ad

Recently uploaded (20)

PDF
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
PDF
SMART SIGNAL TIMING FOR URBAN INTERSECTIONS USING REAL-TIME VEHICLE DETECTI...
PPTX
CyberSecurity Mobile and Wireless Devices
PPTX
Chemical Technological Processes, Feasibility Study and Chemical Process Indu...
PDF
ChapteR012372321DFGDSFGDFGDFSGDFGDFGDFGSDFGDFGFD
PPTX
Sorting and Hashing in Data Structures with Algorithms, Techniques, Implement...
PDF
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
PPTX
ASME PCC-02 TRAINING -DESKTOP-NLE5HNP.pptx
PPTX
Software Engineering and software moduleing
PDF
UNIT no 1 INTRODUCTION TO DBMS NOTES.pdf
PPTX
tack Data Structure with Array and Linked List Implementation, Push and Pop O...
PDF
August 2025 - Top 10 Read Articles in Network Security & Its Applications
PPTX
Fundamentals of safety and accident prevention -final (1).pptx
PPTX
Fundamentals of Mechanical Engineering.pptx
PPTX
Information Storage and Retrieval Techniques Unit III
PPT
INTRODUCTION -Data Warehousing and Mining-M.Tech- VTU.ppt
PDF
Accra-Kumasi Expressway - Prefeasibility Report Volume 1 of 7.11.2018.pdf
PDF
distributed database system" (DDBS) is often used to refer to both the distri...
PPTX
introduction to high performance computing
PDF
III.4.1.2_The_Space_Environment.p pdffdf
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
SMART SIGNAL TIMING FOR URBAN INTERSECTIONS USING REAL-TIME VEHICLE DETECTI...
CyberSecurity Mobile and Wireless Devices
Chemical Technological Processes, Feasibility Study and Chemical Process Indu...
ChapteR012372321DFGDSFGDFGDFSGDFGDFGDFGSDFGDFGFD
Sorting and Hashing in Data Structures with Algorithms, Techniques, Implement...
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
ASME PCC-02 TRAINING -DESKTOP-NLE5HNP.pptx
Software Engineering and software moduleing
UNIT no 1 INTRODUCTION TO DBMS NOTES.pdf
tack Data Structure with Array and Linked List Implementation, Push and Pop O...
August 2025 - Top 10 Read Articles in Network Security & Its Applications
Fundamentals of safety and accident prevention -final (1).pptx
Fundamentals of Mechanical Engineering.pptx
Information Storage and Retrieval Techniques Unit III
INTRODUCTION -Data Warehousing and Mining-M.Tech- VTU.ppt
Accra-Kumasi Expressway - Prefeasibility Report Volume 1 of 7.11.2018.pdf
distributed database system" (DDBS) is often used to refer to both the distri...
introduction to high performance computing
III.4.1.2_The_Space_Environment.p pdffdf
Ad

1.front page (cryptography & computer network)

  • 1. A Seminar report On “Cryptography & Computer Network” Submitted to Computer Engineering Department JAMIA INSTITUTE OF ENGINEERING & MANAGEMENT STUDIES AKKALKUWA (M.H) Guided By: Submitted By: Shaikh Afaque “Mr. Mohammad Asif” Assistant Professor Computer Engineering Dept. Computer Engineering Department JAMIA INSTITUTE OF ENGINEERING & MANAG. STUDIES AKKALKUWA(MH) NORTH MAHARASHTRA UNIVERSITY