tag:blogger.com,1999:blog-4717174821339549439.post1973894247905496..comments2023-05-17T08:56:25.754-07:00Comments on NS2: Symmetric Key Encryption in Ns2Prasannahttp://www.blogger.com/profile/08379057192176374719noreply@blogger.comBlogger26125tag:blogger.com,1999:blog-4717174821339549439.post-12766169901842319562019-09-04T02:01:26.094-07:002019-09-04T02:01:26.094-07:00mail me the code thiru.fstpl@gmail.commail me the code thiru.fstpl@gmail.comAnonymoushttps://www.blogger.com/profile/02429546517749119929noreply@blogger.comtag:blogger.com,1999:blog-4717174821339549439.post-73475303501651729852019-07-27T06:34:39.310-07:002019-07-27T06:34:39.310-07:00This comment has been removed by the author.Ihsanul Qamilhttps://www.blogger.com/profile/01584542969453228576noreply@blogger.comtag:blogger.com,1999:blog-4717174821339549439.post-13519816171550801862017-02-12T05:56:35.174-08:002017-02-12T05:56:35.174-08:00HI
Yes i will but wht code or algorithm you need...HI <br /><br />Yes i will but wht code or algorithm you need will def mail you thanksPrasannahttps://www.blogger.com/profile/08379057192176374719noreply@blogger.comtag:blogger.com,1999:blog-4717174821339549439.post-15929317395212376752017-02-07T21:53:51.109-08:002017-02-07T21:53:51.109-08:00can you mail me the code sir(tcl file) . my id div...can you mail me the code sir(tcl file) . my id divya6priya8@gmail.comAnonymoushttps://www.blogger.com/profile/13453525735182818059noreply@blogger.comtag:blogger.com,1999:blog-4717174821339549439.post-19229900121827639222017-02-01T21:53:33.923-08:002017-02-01T21:53:33.923-08:00can i get basic encryption/decryption codecan i get basic encryption/decryption codeAnonymousnoreply@blogger.comtag:blogger.com,1999:blog-4717174821339549439.post-4891589951404907912016-04-19T22:27:41.020-07:002016-04-19T22:27:41.020-07:00can I get the tcl script for basic encryption algo...can I get the tcl script for basic encryption algorithm?Anonymoushttps://www.blogger.com/profile/03643746048104586502noreply@blogger.comtag:blogger.com,1999:blog-4717174821339549439.post-36493395215174515392015-09-02T20:39:47.866-07:002015-09-02T20:39:47.866-07:00HI
1) Yes you can alter the data flow no prob the...HI<br /><br />1) Yes you can alter the data flow no prob then only you can observe the calculations<br />2) yes you can do it<br />3) See all 7 layers will use in the network so mostly use LL and NL<br />4) You mean two IP addr reffers to IP will not change only the data can be encrypted if u need ip need to change then you need add proxy in server level<br />Prasannahttps://www.blogger.com/profile/08379057192176374719noreply@blogger.comtag:blogger.com,1999:blog-4717174821339549439.post-592847398665190942015-08-19T08:52:08.042-07:002015-08-19T08:52:08.042-07:00Hi,
Please can I get the code for ECDH implementat...Hi,<br />Please can I get the code for ECDH implementation on NS2? I would greatly appreciate. osujiobioma@gmail.com<br />Anonymoushttps://www.blogger.com/profile/17401140049845256518noreply@blogger.comtag:blogger.com,1999:blog-4717174821339549439.post-29848164490611431352015-08-17T21:48:32.356-07:002015-08-17T21:48:32.356-07:00HI
Iam getting failure message so please mail me ...HI<br /><br />Iam getting failure message so please mail me clickprasan@gmail.com to help youPrasannahttps://www.blogger.com/profile/08379057192176374719noreply@blogger.comtag:blogger.com,1999:blog-4717174821339549439.post-23198053614042131022015-07-31T09:35:57.008-07:002015-07-31T09:35:57.008-07:00mymail id quickmailrajesh@gmail.commymail id quickmailrajesh@gmail.comAnonymoushttps://www.blogger.com/profile/00336731690385858919noreply@blogger.comtag:blogger.com,1999:blog-4717174821339549439.post-5864737290579623742015-07-31T09:35:03.742-07:002015-07-31T09:35:03.742-07:00your doing a great job presanna, send me code for ...your doing a great job presanna, send me code for different wire less channel in ad hoc<br />Anonymoushttps://www.blogger.com/profile/00336731690385858919noreply@blogger.comtag:blogger.com,1999:blog-4717174821339549439.post-46756855923400027242015-07-30T06:27:18.134-07:002015-07-30T06:27:18.134-07:00This comment has been removed by the author.SYEDhttps://www.blogger.com/profile/09594149518639057623noreply@blogger.comtag:blogger.com,1999:blog-4717174821339549439.post-74015098706124489312015-06-18T21:14:25.441-07:002015-06-18T21:14:25.441-07:00hello friends, please help me out from these quest...hello friends, please help me out from these questions and confusion...<br />1. can I alter the data flowing in ns2, or can intermediate node compromise the integrity of the message, without the knowledge of sender and receiver.<br /><br />2. can I generate exact 64 bit key or 80 bit key, using diffie hellman key generation algorithm.<br /><br />3. which layer is better for encryption ??<br /><br />4. if i will use, network layer for encrypting the packet.. will IP address also be encrypted... i mean header of IP address will also be encrypted..<br /><br />I urgently need solution to above queries.. please reply ASAP Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-4717174821339549439.post-27160104644210094502015-05-21T12:16:05.751-07:002015-05-21T12:16:05.751-07:00hi, can you send me the code..vry urgent pls
my em...hi, can you send me the code..vry urgent pls<br />my email revient.ode@gmail.com<br />thanksAnonymoushttps://www.blogger.com/profile/07089943343149526490noreply@blogger.comtag:blogger.com,1999:blog-4717174821339549439.post-25715811648617540492015-04-22T22:11:23.811-07:002015-04-22T22:11:23.811-07:00Thanks for using my blog mailed you Please check a...Thanks for using my blog mailed you Please check and let me know the base paper so that based upon the algorithm will help youPrasannahttps://www.blogger.com/profile/08379057192176374719noreply@blogger.comtag:blogger.com,1999:blog-4717174821339549439.post-56177653162454049892015-04-22T18:43:57.835-07:002015-04-22T18:43:57.835-07:00Hello All,
Recently I'm working on cluster hea...Hello All,<br />Recently I'm working on cluster head selection area. Could you please provide me with the code of the cluster head selection algorithm based upon IP, it's urgent. Thank you in advance.<br /><br />Regards,<br />Dana <br />moni-abodi@hotmail.comDanahttps://www.facebook.com/dana.dona2noreply@blogger.comtag:blogger.com,1999:blog-4717174821339549439.post-79416507139920040382015-04-14T21:06:00.880-07:002015-04-14T21:06:00.880-07:00Hi Sham
As already mailed please let me know, we ...Hi Sham<br /><br />As already mailed please let me know, we have numerous algorithm for cluster head, based upon ip, energy so much please let me know exact method focusing onPrasannahttps://www.blogger.com/profile/08379057192176374719noreply@blogger.comtag:blogger.com,1999:blog-4717174821339549439.post-83530689870703539432015-04-10T01:03:37.227-07:002015-04-10T01:03:37.227-07:00Please someone mail me the code for cluster head s...Please someone mail me the code for cluster head selection and ECDH algorithm at the earliest.I'm in urgent needAnonymoushttps://www.blogger.com/profile/12807217047311332033noreply@blogger.comtag:blogger.com,1999:blog-4717174821339549439.post-83733814912669271292015-03-30T22:33:10.190-07:002015-03-30T22:33:10.190-07:00Hi Susi,
Yes sure can you please mail me your bas...Hi Susi,<br /><br />Yes sure can you please mail me your base paper and based upon that we can proceed and def code will be shared thanksPrasannahttps://www.blogger.com/profile/08379057192176374719noreply@blogger.comtag:blogger.com,1999:blog-4717174821339549439.post-91586179226068583682015-03-30T04:10:27.656-07:002015-03-30T04:10:27.656-07:00can you send me the code..vry urgent plscan you send me the code..vry urgent plssachin_rthttps://www.blogger.com/profile/05513705748092018766noreply@blogger.comtag:blogger.com,1999:blog-4717174821339549439.post-68417576673306962352015-01-29T01:52:22.327-08:002015-01-29T01:52:22.327-08:00Hi,
Can you sent to me codes for asymmetric key or...Hi,<br />Can you sent to me codes for asymmetric key or elliptic curve cryptography?Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-4717174821339549439.post-30752262645836472532015-01-22T00:48:40.045-08:002015-01-22T00:48:40.045-08:00Hi,
Please email me the code for encryption and de...Hi,<br />Please email me the code for encryption and decryption using symmetric keyAnonymoushttps://www.blogger.com/profile/02283064076849608103noreply@blogger.comtag:blogger.com,1999:blog-4717174821339549439.post-5797061993459866772014-11-12T21:19:18.619-08:002014-11-12T21:19:18.619-08:00HI Thanks
please email me clickprasan@gmail.com s...HI Thanks<br /><br />please email me clickprasan@gmail.com so that we can discuss and need to check below codes seems Agent not been declared properly Prasannahttps://www.blogger.com/profile/08379057192176374719noreply@blogger.comtag:blogger.com,1999:blog-4717174821339549439.post-78428409065336759912014-11-11T23:14:52.773-08:002014-11-11T23:14:52.773-08:00hi,
while executing this program ,i getting this e...hi,<br />while executing this program ,i getting this error<br />invalid command name "Agent/BoxAgent"<br />while executing pls reply some one Anonymoushttps://www.blogger.com/profile/00831638728503618520noreply@blogger.comtag:blogger.com,1999:blog-4717174821339549439.post-48488797727347522792014-10-03T01:05:57.825-07:002014-10-03T01:05:57.825-07:00HI
Nasrin will def mail you ThanksHI<br /><br />Nasrin will def mail you ThanksPrasannahttps://www.blogger.com/profile/08379057192176374719noreply@blogger.com