[PDF][PDF] File encryption and decryption using secure RSA

RS Jamgekar, GS Joshi - International Journal of Emerging Science and …, 2013 - Citeseer
In this paper we have introduced secure RSA for secure file transmission. There are many
cases where we need secure file transmission for example in banking transactions …

A Novel and efficient public key encryption algorithm

PMDR Vincent… - International Journal of …, 2016 - inderscienceonline.com
In the globalised world, most of the data which includes financial information are transferred
on the internet as a result of which organisations face unprecedented security threats …

[PDF][PDF] Enhanced, modified and secured RSA cryptosystem based on n prime numbers and offline storage for medical data transmission via mobile phone

AH Thiziers, CT Haba, JT Zoueu… - … Journal of Advanced …, 2019 - pdfs.semanticscholar.org
The transmission of medical data by mobile telephony is an innovation that constitutes the m-
health or more generally e-health. This telemedicine handles personal data of patients who …

[PDF][PDF] Add-on security level for public key cryptosystem using magic rectangle with column/row shifting

DI George, JS Geetha, K Mani - International Journal of Computer …, 2014 - Citeseer
In today's world, security is required to transmit confidential information over the network.
Security is also demanded in wide range of applications. Cryptographic algorithms play an …

[PDF][PDF] Hybrid security approachby combining diffie-hellman and RSA algorithms

CA Bhattacharjee, C Khaskel, D Basu… - International Journal of …, 2016 - researchgate.net
Data security has got to be amongst the most vital worries of the aggregate data innovation
improvement process. So network security is the subject which is applicable anywhere in the …

[PDF][PDF] A Research on enhancing public key cryptography by the use of MRGA with RSA and N-Prime RSA

H Gandhi, V Gupta, I Rajput - … for Innovative Research in Science & …, 2015 - academia.edu
In current scenario everything is being transferred on the web and other communication
medium. So that we need to make our data secure from all other attacker and unauthorized …

Encryption Key Generation by Using Modified Hand-Geometry Based Cryptosystem to Secure SMS in Android

S Bhar - International Journal of Computer Science and …, 2015 - papers.ssrn.com
A biometric is defined as a unique, measurable, biological characteristic or trait for
automatically recognizing or verifying the identity of a human being. Statistically analyzing …

[PDF][PDF] Encryption & Decryption of Text Data with RSA cryptography using MATLAB

S Sahu, J Singh, J Ashraf - International Journal of Science & Engg, 2015 - academia.edu
The Research was under taken in order to develop better and faster algorithms for
implementation of RSA system in Cryptography. Various types of Symmetrical and …

[PDF][PDF] تاذ ةجودزملا لام ةبتر 23

RSA An Improved, EM Square - iasj.net
Because of the computers systems discovery and the use of computer networks between
countries, security is very important to transfer confidential information over the networks; …

[PDF][PDF] Add-on Security Level for Public Key Cryptosystem using Magic Rectangle with Column/Row Shifting

JS Geetha, K Mani - International Journal of Computer Applications - academia.edu
In today's world, security is required to transmit confidential information over the network.
Security is also demanded in wide range of applications. Cryptographic algorithms play an …