Applying Visual Cryptography to Decrypt Data Using Human Senses
In the era of cryptographic advancement, integrating human workflow with technology is a
natural progression. Traditionally, cryptographic advancements have focused on …
natural progression. Traditionally, cryptographic advancements have focused on …
A novel and highly secure encryption methodology using a combination of AES and visual cryptography
SR Rupanagudi, VG Bhat, R Anushree… - … on Advances in …, 2016 - ieeexplore.ieee.org
With the ever increasing human dependency on The Internet for performing various activities
such as banking, shopping or transferring money, there equally exists a need for safe and …
such as banking, shopping or transferring money, there equally exists a need for safe and …
Authentication-Based Hybrid Approach Using RSA for Data Security in the Cloud
Cloud computing is one of the important components of today's tech-savvy society. It creates
a new paradigm for information exchange without investing in new infrastructure or licensing …
a new paradigm for information exchange without investing in new infrastructure or licensing …
An Improved Server Validation Scheme for Multi-server Infrastructure
H Monga, N Girdhar - National Academy Science Letters, 2020 - Springer
An improved server validation scheme for a multi-server infrastructure has been introduced.
In this scheme, each member involved in communication has to prove its validation before …
In this scheme, each member involved in communication has to prove its validation before …
Phishing site detection and blacklisting using EVCS, steganography based on android application
A Shaji, M Stephen, S Sadanandan… - … on Intelligent Data …, 2019 - Springer
Online shopping allows consumers to buy goods or services over the Internet. As the
popularity of online shopping increases, Debit or Credit card fraud and personal information …
popularity of online shopping increases, Debit or Credit card fraud and personal information …
The Socio‐Behavioral Cipher Technique
H Bhatia, R Johari, K Gupta - Design and Analysis of Security …, 2020 - Wiley Online Library
The primitive and the traditional symmetric key cryptographic systems made use of a limited
number of input keys with single encryption function for securing the data before the data …
number of input keys with single encryption function for securing the data before the data …
Cryptography: A Review
S Vasanthi, MH Surekha, GN Vachana… - … -systems and Signal …, 2017 - pices-journal.com
In today's Internet world security plays a very important role in securing data. After noticing
constant reports of data theft and hacking, enhancing security of the data has become …
constant reports of data theft and hacking, enhancing security of the data has become …