[PDF][PDF] A performance analysis of DES and RSA cryptography
Security is playing a vital role in the field of communication system and Internet. Data
encryption standard (DES) and the Rivest-Shamir-Adleman (RSA) algorithms are the two …
encryption standard (DES) and the Rivest-Shamir-Adleman (RSA) algorithms are the two …
[PDF][PDF] International journal of advanced research in computer science and software engineering
AB Angadi, AB Angadi, KC Gull - International Journal, 2013 - academia.edu
Relational database management systems (RDMBSs) today are the predominant
technology for storing. In the past few years, the” one size fits all “-thinking concerning …
technology for storing. In the past few years, the” one size fits all “-thinking concerning …
[PDF][PDF] SMS security in mobile devices: a survey
MW Khan - International Journal of Advanced Networking and …, 2013 - academia.edu
-------------------------------------------------------------------ABSTRACT-------------------------------------------
-------------------The Short Message Service (SMS) is one of the frequently used mobile …
-------------------The Short Message Service (SMS) is one of the frequently used mobile …
[PDF][PDF] RSA algorithm key generation extension
SA Dar - International Journal of Modern Trends in Engineering …, 2018 - researchgate.net
Computers and Computer Networks have revolutionized the world in the last few decades.
Along with the advancement in technology, the major concerns have been to prevent …
Along with the advancement in technology, the major concerns have been to prevent …
[PDF][PDF] Enhanced Data Encryption Standard using variable size key (128N Bits) and 96 Bit subkey
AK Singh, S Varshney - International Journal of Computer …, 2014 - academia.edu
In this paper 'EDES (Enhanced Data Encryption Standard) using variable size key (128n
bits) and 96bit sub-key', we are providing a solution for an efficient and enhanced encryption …
bits) and 96bit sub-key', we are providing a solution for an efficient and enhanced encryption …
[PDF][PDF] An overview of real time secure SMS transmission
SD Rautkar, DPS Prasad - … of Advanced Research in Computer and …, 2015 - academia.edu
There are so much daily routine application where the SMS is being used including medical
purpose, banking purpose and any other mobile purpose. Forwarding an SMS is one of the …
purpose, banking purpose and any other mobile purpose. Forwarding an SMS is one of the …
[PDF][PDF] Password hardened biometric: A complete solution of online security
A Sharma, DB Ojha - International Journal of Computer Network and …, 2013 - mecs-press.org
In present epoch, secure online access to enterprises resources is very important for any
organization. To protect valuable data become one of the big challenge for today's business …
organization. To protect valuable data become one of the big challenge for today's business …
[PDF][PDF] AN IMPERATIVE REPETITION FOR VEHICLE AD-HOC NETWORK COMMUNICATION SYSTEM
QoS of VANET is too much tedious task for humans, as life challenging. In this article we
approach a system for prevent congestion as well as recovery after congestion. Today's era …
approach a system for prevent congestion as well as recovery after congestion. Today's era …
[PDF][PDF] Enhancing DES Using Local Languages
CPR Reagan, S Selvi, SP Devi, V Natarajan - Citeseer
Network services and internet plays vital role in transmitting information from source to
destination. The transmitted information undergoes security attacks by the hackers. Hacker …
destination. The transmitted information undergoes security attacks by the hackers. Hacker …
[PDF][PDF] The New Image Encryption and Decryption Using Quasi Group
Multimedia communication is the new age of communication. The image communication is
one of most popular multimedia communication. This type of communication always faces …
one of most popular multimedia communication. This type of communication always faces …