CSE

Digital Signature in Cryptography & Network Security

What is Digital Signature and how it works? It is a mathematical stream for demonstrating the authenticity of Digital Signature or documents. A valid signature gives a receipt reason to believe that the message was created by a known sender such that the sender cannot deny having sent the message and the message was not […]

Digital Signature in Cryptography & Network Security Read More »

Caesar Cipher Substitution Technique with Example

In cryptography, substitution is a technique in which plaintext letters are replaced with other letters, numbers, or symbols. Substitution includes substituting plaintext bit patterns with ciphertext bit patterns if the plaintext is considered as a sequence of bits. Caesar Cipher is one of the substitution techniques first used by Julius Caesar. Caesar Cipher The Caesar

Caesar Cipher Substitution Technique with Example Read More »

Agile Model in Software Engineering

The agile model was proposed in the mid-1990s to overcome the existing faults in the waterfall development methodology. The agile model was established to support a project with rapidly responds to changing needs. It places a higher emphasis on face-to-face contact than on written documentation. The development team should be intentionally kept small (5–9 persons)

Agile Model in Software Engineering Read More »

Iterative Enhancement Model in Software Engineering

The iterative enhancement model in software engineering combines elements of the linear sequential model with the iterative philosophy of prototyping. In this model, the software is broken down into several modules which are incrementally developed and delivered. Firstly, the development team develops the core module of the system. After that, it is refined into increasing

Iterative Enhancement Model in Software Engineering Read More »

Scroll to Top