Rekha Kashyap's scientific contributions
What is this page?
This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
Publications (2)
Security of data is very important while providing communication either by the wired or wireless medium. It is a very challenging issue in the world and the wireless mobile network makes it more challenging. In a wireless mobile network, there is a cluster of self-contained, self-organized networks that form a temporarily multi-hop peer-to-peer rad...
The midday meal program is an initiative by the government and Non-Governmental Organization (NGO) to tackle malnutrition among younger generations, enrolled in educational institutions aiming to provide a nutritious meals. It is a large scale food assistance program with an overwhelming budget. Despite government authorities trying their best to m...
Citations
... Malik et al. [19] explained the man-in-the-middle attack as a network security attack that involves interrupting and changing the network traffic between two parties. In the context of routing protocols, this can be achieved by spoofing routing packets, causing routers to direct traffic through the assailant's machine. ...