Analysis of encryption algorithms (RSA, SRNN and 2 key pair) for information security
SY Bonde, US Bhadade - 2017 International Conference on …, 2017 - ieeexplore.ieee.org
To transmit confidential information like e-mails, banking transactions, credit card details etc.
over the unsecured network like internet Security is essential. There are more chances to …
over the unsecured network like internet Security is essential. There are more chances to …
[PDF][PDF] Improved RSA cryptosystem based on the study of number theory and public key cryptosystems
I Jahan, M Asif, LJ Rozario - American Journal of Engineering …, 2015 - academia.edu
Security is required to transmit confidential information over the network. Security is also
demanding in wide range of applications. Cryptographic algorithms play a vital role in …
demanding in wide range of applications. Cryptographic algorithms play a vital role in …
[PDF][PDF] A modified RSA encryption technique based on multiple public keys
AA Ayele, V Sreenivasarao - International Journal of Innovative …, 2013 - academia.edu
In the today‟ s world, security is required to transmit confidential information over the
network. Security is also demanding in wide range of applications. Cryptographic algorithms …
network. Security is also demanding in wide range of applications. Cryptographic algorithms …
Multi-fingerprint unimodel-based biometric authentication supporting cloud computing
Cloud computing is one of the emerging technologies that transfers network users to the
next level. Security is one of the critical challenges faced by cloud computing. Biometrics …
next level. Security is one of the critical challenges faced by cloud computing. Biometrics …
[PDF][PDF] SMS security in mobile devices: a survey
MW Khan - International Journal of Advanced Networking and …, 2013 - academia.edu
-------------------------------------------------------------------ABSTRACT-------------------------------------------
-------------------The Short Message Service (SMS) is one of the frequently used mobile …
-------------------The Short Message Service (SMS) is one of the frequently used mobile …
A new modified version of standard RSA cryptography algorithm
Data security is an open research challenge due to the rapid evolution in communication
over an unsecured network. In this direction, cryptographic algorithms play an important role …
over an unsecured network. In this direction, cryptographic algorithms play an important role …
[PDF][PDF] Analysis and enhancement of speed in public key cryptography using message encoding algorithm
DIG Amalarethinam, JS Geetha… - Indian Journal …, 2015 - sciresol.s3.us-east-2.amazonaws …
In the world of internet, Cryptography places a vital role as an effective measure to maintain
information security. Whenever the security of public key cryptography algorithm increases …
information security. Whenever the security of public key cryptography algorithm increases …
Security enhancement and speed monitoring of RSA algorithm
S Patel, K Shah - International Journal of Engineering Development and …, 2014 - rjwave.org
Cryptography involves the science and technique to secure the information. Public key
cryptography with the idea of key pair-up is a great break-through for the traditional …
cryptography with the idea of key pair-up is a great break-through for the traditional …
Database encryption using asymmetric keys: a case study
Data security has become an issue of increasing importance, especially for Web
applications and distributed databases. One solution is using cryptographic algorithms …
applications and distributed databases. One solution is using cryptographic algorithms …
A Hybrid Cryptosystem approach for file security by using merging mechanism
The expeditious growth of internet and networks applications has given rise to many data
security issues. Encryption algorithm plays a crucial role in information and network security …
security issues. Encryption algorithm plays a crucial role in information and network security …