Pranav Ambavkar

Pranav Ambavkar
Veermata Jijabai Technological Institute | VJTI · Computer Engineering and Information Technology

M.Tech

About

5
Publications
8,154
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
6
Citations
Citations since 2016
0 Research Items
4 Citations
20162017201820192020202120220.00.51.01.52.02.53.0
20162017201820192020202120220.00.51.01.52.02.53.0
20162017201820192020202120220.00.51.01.52.02.53.0
20162017201820192020202120220.00.51.01.52.02.53.0
Education
August 2010 - June 2012
Veermata Jijabai Technological Institute
Field of study
  • Computer with specilization in Network

Publications

Publications (5)
Article
Full-text available
Wifi device uses security authentication protocol even though they are having some weakness. Generally wep, wpa protocols are used for security purpose. This is already proved that WEP authentication protocol is a weak protocol. By analyzing weakness of wep the concept of WPA and WPA2 developed. In this paper, we will examine the weak-nesses of "St...
Article
Full-text available
Desktop virtualization is new desktop delivery method in which desktop operating system instance customized, build and runs in data centers and users can access application or the whole desktop by using their stateless 'thin clients' devices. This method promises significant benefits in terms of data security, total cost of ownership and manageabil...
Article
Full-text available
These days wireless communication is basic need of people. Users want to secure their important information. For security purpose different kinds of protocols are available. But fast development in codes, standards and technology gives opportunity to hack and steal the important information over wireless network. Therefore the security of network s...
Article
Full-text available
Information security is concerned with the confidentiality, integrity and availability of data regardless of the form the data may take. Information security can be categorized in various ways like in wired and wireless security. Wireless network security differs with implementation requirement. This paper proposes survey of insecurities and securi...
Article
Full-text available
In programming sometimes some condition which was assumed to be true is false during the program execution or the value of the variable which was assumed is not during program execution. The result of this the output will not be as expected. The errors like segmentation fault, logical errors can be understood during program execution only. Therefor...