[PDF][PDF] File encryption and decryption using secure RSA
RS Jamgekar, GS Joshi - International Journal of Emerging Science and …, 2013 - Citeseer
In this paper we have introduced secure RSA for secure file transmission. There are many
cases where we need secure file transmission for example in banking transactions …
cases where we need secure file transmission for example in banking transactions …
A Novel and efficient public key encryption algorithm
PMDR Vincent… - International Journal of …, 2016 - inderscienceonline.com
In the globalised world, most of the data which includes financial information are transferred
on the internet as a result of which organisations face unprecedented security threats …
on the internet as a result of which organisations face unprecedented security threats …
[PDF][PDF] Enhanced, modified and secured RSA cryptosystem based on n prime numbers and offline storage for medical data transmission via mobile phone
The transmission of medical data by mobile telephony is an innovation that constitutes the m-
health or more generally e-health. This telemedicine handles personal data of patients who …
health or more generally e-health. This telemedicine handles personal data of patients who …
[PDF][PDF] Add-on security level for public key cryptosystem using magic rectangle with column/row shifting
In today's world, security is required to transmit confidential information over the network.
Security is also demanded in wide range of applications. Cryptographic algorithms play an …
Security is also demanded in wide range of applications. Cryptographic algorithms play an …
[PDF][PDF] Hybrid security approachby combining diffie-hellman and RSA algorithms
CA Bhattacharjee, C Khaskel, D Basu… - International Journal of …, 2016 - researchgate.net
Data security has got to be amongst the most vital worries of the aggregate data innovation
improvement process. So network security is the subject which is applicable anywhere in the …
improvement process. So network security is the subject which is applicable anywhere in the …
[PDF][PDF] A Research on enhancing public key cryptography by the use of MRGA with RSA and N-Prime RSA
H Gandhi, V Gupta, I Rajput - … for Innovative Research in Science & …, 2015 - academia.edu
In current scenario everything is being transferred on the web and other communication
medium. So that we need to make our data secure from all other attacker and unauthorized …
medium. So that we need to make our data secure from all other attacker and unauthorized …
Encryption Key Generation by Using Modified Hand-Geometry Based Cryptosystem to Secure SMS in Android
S Bhar - International Journal of Computer Science and …, 2015 - papers.ssrn.com
A biometric is defined as a unique, measurable, biological characteristic or trait for
automatically recognizing or verifying the identity of a human being. Statistically analyzing …
automatically recognizing or verifying the identity of a human being. Statistically analyzing …
[PDF][PDF] Encryption & Decryption of Text Data with RSA cryptography using MATLAB
S Sahu, J Singh, J Ashraf - International Journal of Science & Engg, 2015 - academia.edu
The Research was under taken in order to develop better and faster algorithms for
implementation of RSA system in Cryptography. Various types of Symmetrical and …
implementation of RSA system in Cryptography. Various types of Symmetrical and …
[PDF][PDF] تاذ ةجودزملا لام ةبتر 23
RSA An Improved, EM Square - iasj.net
Because of the computers systems discovery and the use of computer networks between
countries, security is very important to transfer confidential information over the networks; …
countries, security is very important to transfer confidential information over the networks; …
[PDF][PDF] Add-on Security Level for Public Key Cryptosystem using Magic Rectangle with Column/Row Shifting
In today's world, security is required to transmit confidential information over the network.
Security is also demanded in wide range of applications. Cryptographic algorithms play an …
Security is also demanded in wide range of applications. Cryptographic algorithms play an …