[PDF][PDF] A performance analysis of DES and RSA cryptography

S Singh, SK Maakar, S Kumar - … of Emerging Trends & Technology in …, 2013 - academia.edu
Security is playing a vital role in the field of communication system and Internet. Data
encryption standard (DES) and the Rivest-Shamir-Adleman (RSA) algorithms are the two …

[PDF][PDF] International journal of advanced research in computer science and software engineering

AB Angadi, AB Angadi, KC Gull - International Journal, 2013 - academia.edu
Relational database management systems (RDMBSs) today are the predominant
technology for storing. In the past few years, the” one size fits all “-thinking concerning …

[PDF][PDF] SMS security in mobile devices: a survey

MW Khan - International Journal of Advanced Networking and …, 2013 - academia.edu
-------------------------------------------------------------------ABSTRACT-------------------------------------------
-------------------The Short Message Service (SMS) is one of the frequently used mobile …

[PDF][PDF] RSA algorithm key generation extension

SA Dar - International Journal of Modern Trends in Engineering …, 2018 - researchgate.net
Computers and Computer Networks have revolutionized the world in the last few decades.
Along with the advancement in technology, the major concerns have been to prevent …

[PDF][PDF] Enhanced Data Encryption Standard using variable size key (128N Bits) and 96 Bit subkey

AK Singh, S Varshney - International Journal of Computer …, 2014 - academia.edu
In this paper 'EDES (Enhanced Data Encryption Standard) using variable size key (128n
bits) and 96bit sub-key', we are providing a solution for an efficient and enhanced encryption …

[PDF][PDF] An overview of real time secure SMS transmission

SD Rautkar, DPS Prasad - … of Advanced Research in Computer and …, 2015 - academia.edu
There are so much daily routine application where the SMS is being used including medical
purpose, banking purpose and any other mobile purpose. Forwarding an SMS is one of the …

[PDF][PDF] Password hardened biometric: A complete solution of online security

A Sharma, DB Ojha - International Journal of Computer Network and …, 2013 - mecs-press.org
In present epoch, secure online access to enterprises resources is very important for any
organization. To protect valuable data become one of the big challenge for today's business …

[PDF][PDF] AN IMPERATIVE REPETITION FOR VEHICLE AD-HOC NETWORK COMMUNICATION SYSTEM

I Verma, P Singh - ijaer.com
QoS of VANET is too much tedious task for humans, as life challenging. In this article we
approach a system for prevent congestion as well as recovery after congestion. Today's era …

[PDF][PDF] Enhancing DES Using Local Languages

CPR Reagan, S Selvi, SP Devi, V Natarajan - Citeseer
Network services and internet plays vital role in transmitting information from source to
destination. The transmitted information undergoes security attacks by the hackers. Hacker …

[PDF][PDF] The New Image Encryption and Decryption Using Quasi Group

A Agarwal, A Varma, D Kumar - Journal: INTERNATION JOURNAL OF … - academia.edu
Multimedia communication is the new age of communication. The image communication is
one of most popular multimedia communication. This type of communication always faces …