Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
    • by  and +1
    •   77  
      MarketingPublic AdministrationPrivacyManufacturing
Abstract: Encryption is the most effective way to achieve data security. It is the process in which plain text converts into a cipher text and allows only authorized people to access the sender information. In this research paper I would... more
    • by 
    •   6  
      CryptographyEncryptionSymmetric groupHashing
In recent years network security has become an important issue. Encryption has come up as a solution, and plays an important role in information security system. Many techniques are needed to protect the shared data. The present work... more
    • by 
    •   5  
      EncryptionASCIIDecryptionCipher text
In many business sectors secure and efficient data transfer is essential. To ensure the security to the applications of business, the business sectors use Public Key Cryptographic Systems (PKCS). An RSA and NTRU system generally belongs... more
    • by 
    •   7  
      Computer ScienceEncryptionPerformance AnalysisDecryption
Cloud provides high quality computing services, also it’s provided high performance services in a low cost makes it becomes a popular paradigm. The infrastructure of cloud was flexible, net centric approach, and easy to access. But its... more
    • by 
    •   6  
      CloudsEncryptionCloud ComputingData Security
In this modern world of communications, cryptography has an important role in the security of data transmission and is the best method of data protection against passive and active fraud. Cryptography is an algorithmic process of... more
    • by 
    •   4  
      EncryptionDecryptionKey generationCipher text
Security and confidentiality of data or information at the present time has become an important concern. Advanced methods for secure transmission, storage, and retrieval of digital images are increasingly needed for a number of military,... more
    • by 
    •   5  
      Computer ScienceImage EncryptionRSAComputer Applications
Banking is one of the most important aspects of everyday routine. Several users are using it for performing numerous transactions and many of them have become online nowadays. With the growth of internet and technology, all the... more
    • by 
    •   8  
      SecurityBankingEncryptionAuthentication
— " The analysis of cryptic text is hard problem " , and there is no fixed algorithm for generating plain-text from cipher text. Human brains do this intelligently. The intelligent cryptic analysis process needs learning algorithms,... more
    • by 
    •   4  
      AI Planning (Artificial Intelligence)CryptographyEncryption AlgorithmCipher text
— In this paper, a session based symmetric key cryptographic system has been proposed and it is termed as Bit Shuffle Technique (BST). This proposed technique is very fast, suitable and secure for encryption of large files. BST consider... more
    • by 
    •   7  
      CryptographyAESSymmetric KeyCipher text
In many business sectors secure and efficient data transfer is essential. To ensure the security to the applications of business, the business sectors use Public Key Cryptographic Systems (PKCS). An RSA and NTRU system generally belongs... more
    • by 
    •   4  
      EncryptionDecryptionCipher textPrivate Key
— Confidentiality in communication is an important aspect at individual level or organization level. Symmetric key cryptography has been quite popular over a number of years. But, growing technology level may act as boon or bane. Here is... more
    • by 
    •   4  
      CryptographySymmetricCipher textPlain Text
    • by 
    •   20  
      Digital SignatureBiometricsCryptographyAuthentication
Nowadays, the computer network has changed the mode of people's communication. People can easily transfer the various information through the network. However, because of the openness of the network, people have to take more and more... more
    • by  and +1
    •   8  
      Information SecurityComputer SecurityCryptographyEncryption
Multipliers are the essential and abundant part of DSP applications. There are different types of multipliers are used to perform various applications. Array multipliers, Vedic multipliers are two different types of multipliers. Based on... more
    • by 
    •   5  
      RSA ALGORITHMVedic Multiplier 8x8Cipher textModular exponentiation
Nowadays, the rates of malicious data theft and data destruction are alarming. Governments, companies and other organizations have lost a lot of money and many others have closed down due to the activities of dubious hackers and... more
    • by 
    •   6  
      EncryptionCloud StorageSymmetric key encryptionAsymmetric Encryptions
Security is playing a vital role in the field of communication system and Internet. Data encryption standard (DES) and the Rivest-Shamir-Adleman (RSA) algorithms are the two popular encryption algorithms that vouch confidentiality and... more
    • by 
    •   12  
      Computer ScienceCryptographyEncryptionRSA
Cloud provides high quality computing services, also it’s provided high performance services in a low cost makes it becomes a popular paradigm. The infrastructure of cloud was flexible, net centric approach, and easy to access. But its... more
    • by 
    •   7  
      CloudsEncryptionCloud ComputingData Security
Cloud provides high quality computing services, also it’s provided high performance services in a low cost makes it becomes a popular paradigm. The infrastructure of cloud was flexible, net centric approach, and easy to access. But its... more
    • by 
    •   7  
      CloudsEncryptionCloud ComputingData Security
Cloud provides high quality computing services, also it’s provided high performance services in a low cost makes it becomes a popular paradigm. The infrastructure of cloud was flexible, net centric approach, and easy to access. But its... more
    • by 
    •   6  
      CloudsEncryptionCloud ComputingData Security
Wireless Sensor Network is a combination of one and more nodes basically used for data collection and data aggregation. The collected data is aggregated through a data aggregator and it will be sent to bases station. While data transfer... more
    • by 
    •   5  
      Data AggregationSensor NetworksCipher textFibonacci Number system