[PDF][PDF] A Review on DNA Based Cryptographic Techniques.
A Hazra, S Ghosh, S Jash - Int. J. Netw. Secur., 2018 - ijns.jalaxy.com.tw
Today, data security has become a great concern. The increase in digitalization and e-
commerce has encouraged more and more people to use the Internet. As a result, the web …
commerce has encouraged more and more people to use the Internet. As a result, the web …
[PDF][PDF] Secure data transfer through DNA cryptography using symmetric algorithm
BB Raj, JF Vijay, T Mahalakshmi - International Journal of Computer …, 2016 - Citeseer
This paper presents a novel symmetric algorithm in the area of DNA cryptography. Secure
Data Transfer is an important factor for data transmission. The transmission of information …
Data Transfer is an important factor for data transmission. The transmission of information …
[PDF][PDF] A DNA-based cryptographic key generation algorithm
SM Hussain, H Al-Bahadili - Int'l Conf. Secur. Manag, 2016 - researchgate.net
This paper presents a detail description of a new DNA-based cryptographic key generation
algorithm that can be used to generate strong cryptographic key (s) for symmetric ciphering …
algorithm that can be used to generate strong cryptographic key (s) for symmetric ciphering …
Enhancement of a Symmetric Based Cryptosystem Using Deoxyribonucleic Acid Sequence and Residue Number System
AM Logunleko - 2022 - search.proquest.com
The awareness of the use of Internet and its applications in all realms of life has increased in
recent times. The users are concerned about the security and privacy of data and …
recent times. The users are concerned about the security and privacy of data and …
[HTML][HTML] IOT monitoring membrane computing based on quantum inspiration to enhance security in cloud network
G Visalaxi, A Muthukumaravel - Measurement: Sensors, 2023 - Elsevier
Human computation is a technology inspired by nature. The majority of its computational
sources are physiologically motivated computations. The existing calculation, on the other …
sources are physiologically motivated computations. The existing calculation, on the other …
A New Bio-inspired Computing Algorithm for Symmetric Encryption
B Raj, J Vijay - Australian Journal of Basic and Applied Sciences, 2016 - papers.ssrn.com
In this paper, a new Bio-inspired computing algorithm for symmetric encryption. Information
flows throughout the network that can be of local or of global scope. It is mandatory to secure …
flows throughout the network that can be of local or of global scope. It is mandatory to secure …
Improved 2-level data security approach using DNA cryptography
IM Awwal, JA Ojekunle, OA Abisoye, GA Babalola… - 2021 - IET
Cryptography is the process of transforming the meaning of information with the aid of an
encryption key. DNA cryptography is a new rapidly evolving technology that uses DNA …
encryption key. DNA cryptography is a new rapidly evolving technology that uses DNA …
[PDF][PDF] A DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRID
WM Abed - academia.edu
Smart grid utility provider collects consumers' power consumption data for three main
reasons: billing, analysis, and operation. Billing needs coarse-grained data where there are …
reasons: billing, analysis, and operation. Billing needs coarse-grained data where there are …
A DNA-based smart meter authentication scheme
SM Hussain, H Al-Bahadili… - 2017 2nd International …, 2017 - ieeexplore.ieee.org
In this paper, we propose a strong, efficient, and reliable DNA-based authentication solution
of smart meters to assure the confidentiality and integrity of the messages exchanged across …
of smart meters to assure the confidentiality and integrity of the messages exchanged across …
An AACO Based Optimized SWiFi Network To Reduce Overheads
G Kaur, G Kaur - INTERNATIONAL JOURNAL OF ENGINEERING …, 2017 - rjwave.org
Nowadays the internet is Janus-faced with several challenges. Verifying data integrity and
authentication are essential security services in order to secure data transmission process …
authentication are essential security services in order to secure data transmission process …