Academic Journals Database
Disseminating quality controlled scientific knowledge

Search Articles for "Cryptography"

ADD TO MY LIST
 
A Hyper Modern Cryptography Algorithm to Improved Data Security: HMCA

Author(s): Vishwa Gupta | Gajendra Singh | Ravindra Gupta
A NEW VARIANT OF SUBSET-SUM CRYPTOSYSTEM OVER RSA

Author(s): Sonal Sharma | Saroj Hiranwal | Prashant Sharma
Security issues in e-learning platforms

Author(s): Defta (Ciobanu) Costinela – Luminita
A Cryptographic Scheme of Finite Fields using Logical Operators

Author(s): G.Naga Lakshmi | B.Ravi Kumar | Ch.Suneetha | A.Chandra Sekhar
TextIndependent Speaker Recognition for Low SNR Environments with Encryption

Author(s): Aman Chadha | Divya Jyoti | M. Mani Roja
Safety Measures using Probability Symmetric Curve Cryptography

Author(s): W. R. Sam Emmanuel | C. Suyambulingom
A Block Cipher Using Graph Structures and Logical XOR Operation

Author(s): CH. Suneetha | D. Sravan Kumar | A.Chandra sekhar
Secure Key Transport in Symmetric Cryptographic Protocols using some Elliptic Curves over finite fields

Author(s): Ch. Suneetha | D. Sravana Kumar | A. Chandrasekhar | K. Vanitha
DNA Computing based Elliptic Curve Cryptography

Author(s): P. Vijayakumar | V. Vijayalakshmi | G. Zayaraz
Design of Reversible Sequential Circuit Using Reversible Logic Synthesis

Author(s): Md. Belayet Ali | Md. Mosharof Hossin | Md. Eneyat Ullah
IMAGE HIDING IN DNA SEQUENCE USING ARITHMETIC ENCODING

Author(s): Prof. Samir Kumar Bandyopadhyay
A Comparitive Study of Cryptosystems with Elliptic Curve Cryptography using Digital Signature

Author(s): Shipra Shukla | Dharmendra Lal Gupta | Anil Kumar Malviya
Halftone based Secret Sharing Visual Cryptographic Scheme for Color Image using Bit Analysis

Author(s): Pavan Kumar Gupta | Naveen Hemrajani | Savita Shiwani | Ruchi Davey
Analysis and Design of Affine and Hill Cipher

Author(s): Mozhgan Mokhtari | Hassan Naraghi
CRYPTOGRAPHIC PROTOCOLS USING ELLIPTIC CURVE OVER FINITE FIELDS

Author(s): D. SRAVANA KUMAR | CH. SUNEETHA | A.CHANDRASEKHAR
ENCRYPTIONS OF DATA STREAMS USING PAULI SPIN ½ MATRICES AND FINITE STATE MACHINE

Author(s): B. Krishna Gandhi | A. Chandra Sekhar | S. Sri lakshmi
Quantum Key Distribution: A Resource Letter

Author(s): Srinivasan Arunachalam
FPGA Based Secure System Design-an Overview

Author(s): Gurjit Singh Walia | Gajraj Kuldeep | Rajiv Kapoor | A K Sharma | Navneet Gaba
Secret Key Agreement Over Multipath Channels Exploiting a Variable-Directional Antenna

Author(s): Valery Korzhik | Viktor Yakovlev | Yuri Kovajkin | Guillermo Morales-Luna
Public Key Cryptosystem Technique Elliptic Curve Cryptography with Generator g for Image Encryption

Author(s): Vinod Kumar Yadav | Dr. A.K. Malviya | D.L. Gupta | Satyendra Singh | Ganesh Chandra
A P2P Approach for Efficient Certificate Revocation in MANET

Author(s): Suresh Babu Tumula | K.R.R.Mohana Rao
Visual cryptography for color images by dithering techniques

Author(s): Lakshmi Priya Tadiboyna | M. Deena Babu
Secured Approach to Routing in Mobile Ad Hoc Networks

Author(s): Rajdeep Singh | Vaishali Gupta
Encryption Of Data Using Elliptic Curve Over Finite Fields

Author(s): D. Sravana Kumar | CH. Suneetha | A. ChandrasekhAR
Using Virtual Security Lab in Teaching Cryptography

Author(s): Salma M. Gaffer | Daniyal M. Alghazzawi
A NOVEL SCHEME FOR TEXT DATA ENCRYPTION

Author(s): Saptarshi Naskar
A Cryptographic Moving-Knife Cake-Cutting Protocol

Author(s): Yoshifumi Manabe | Tatsuaki Okamoto
Random Image Steganography and Steganalysis: Present Status and Future Directions

Author(s): Rengarajan Amirtharajan | Jiaohua Qin | John Bosco Balaguru Rayappan
Survey and Analysis of Hardware Cryptographic and Steganographic Systems on FPGA

Author(s): Sundararaman Rajagopalan | Rengarajan Amirtharajan | Har Narayan Upadhyay | John Bosco Balaguru Rayappan
BDD Based Construction of Resilient Functions

Author(s): Stanislav Stanković | Jaakko Astola
A New Approach for Improving Data Security using Iterative Blowfish Algorithm

Author(s): G. Manikandan | N. Sairam | M. Kamarasan
A Hybrid Approach for Security Enhancement by Compressed Crypto-Stegno Scheme

Author(s): G. Manikandan | N. Sairam | M. Kamarasan
IMPLEMENTATION OF THE TRIPLE-DES BLOCK CIPHER USING VHDL

Author(s): Sai Praveen Venigalla | M. Nagesh Babu | Srinivas Boddu | G. Santhi Swaroop Vemana
A survey on semiovals

Author(s): György Kiss
Segment Based Visual Cryptography For Key Distribution

Author(s): Sesha Pallavi Indrakanti | Avadhani P S
Real time Video Streaming using Novel approach

Author(s): Mukesh Kumar | Jain Akash | B.A.Khivsara | Magar Padmakar | Baphana Abliasaha
An improved approach for Extended Visual Cryptography Scheme for Colour Images

Author(s): Bhandare Shital | Jhade Manoj | Jadhav Angarika
Image Stenography Skin Tone Detection

Author(s): DEEPALI BHAMARE | VIKAS GUPTA | P.B.SALUNKHE
A Novel Approach for Iris Encryption

Author(s): Shrinivasrao B. Kulkarni | Ravindra S. Hegadi | Umakant P. Kulkarni
Desing and Implementation of Distributed Security using Onion Routing

Author(s): Ashish T. Bhole | Savita H. Lambole
Enhanced Novel Security Scheme for Wireless Adhoc Networks: ENSS

Author(s): Prasad Patil | Rinku Shah | Kajal Jewani
Light interference detection on-chip by integrated SNSPD counters

Author(s): Paul Cavalier | Jean-Claude Villégier | Philippe Feautrier | Christophe Constancias | Alain Morand
Learning the Related Mathematics to Cryptography by Interactive Way

Author(s): Mohamed Salim Trigui | Daniyal M. Alghazzawi
Hardware Implementation of Mix Column Step in AES

Author(s): Pratap Kumar Dakua | Manoranjan Pradhan | Subba Rao Polamuri
An Approach for SMS Security using Authentication Functions

Author(s): Neetesh Saxena | Narendra S. Chaudhari
A New Security Protocol for Mobile Ad Hoc Networks

Author(s): K. Sahadevaiah | Prasad Reddy P.V.G.D. | G. Narsimha
Proactive Secret Sharing Scheme for Mobile Ad-hoc Networks

Author(s): Chauhan Gargi K | H. M. Diwanji
Achieving Identity-Based Cryptography in a Personal Digital Assistant Device

Author(s): L. Martínez-Ramos | L. López-García | F. Rodríguez-Henríquez
A Cryptographic Algorithm based onBilinear Transformation

Author(s): Phani krishna kishore M | Venugopal IVS
A Novel Approach for Cheating Prevention through Visual Cryptographic Analysis

Author(s): Morampudi Naresh kumar | Datrika Srinivas Rao | D.Sravanthi
Efficient Detection of Sybil attack Based on Cryptography in Vanet

Author(s): Mina Rahbari | Mohammad Ali Jabreil Jamali
Implimentation of Cryptographic Algorithm for GSM and UMTS Systems.

Author(s): Alpesh R. Sankaliya | V.Mishra | Abhilash Mandloi
A Novel Processor Architecture for Pairing Based Cryptography Applications

Author(s): Ravi Kumar. K | K. Bhavya Deepthi | K. Gowtham | T. Yamini
Dynamic Routing with Security Considerations

Author(s): G. Murali | D. Pavan | V.V. Rajesh Reddy | P. Bharath kumar
Error Filtering Schemes for Color Images in Visual Cryptography

Author(s): Shiny Malar F.R | Jeya Kumar M.K
On the transmission capacity of quantum networks

Author(s): Sandra König | Stefan Rass
Accelerating Solution Proposal of AES Using a Graphic Processor

Author(s): TOMOIAGA, R. D. | STRATULAT, M.
Correlations and Hyper-Correlations

Author(s): Gennaro Auletta
Introduction to Secure PRNGs

Author(s): Majid Babaei | Mohsen Farhadi
Protection and Retrieval of Encrypted Multimedia Content: When Cryptography Meets Signal Processing

Author(s): Erkin Zekeriya | Piva Alessandro | Katzenbeisser Stefan | Lagendijk RL | Shokrollahi Jamshid | Neven Gregory | Barni Mauro
A survey on biometric cryptosystems and cancelable biometrics

Author(s): Rathgeb Christian | Uhl Andreas
A Survey of Watermarking Algorithms for Image Authentication

Author(s): Rey Christian | Dugelay Jean-Luc
A DSP Based POD Implementation for High Speed Multimedia Communications

Author(s): Zhang Chang Nian | Li Hua | Zhang Nuannuan | Xie Jiesheng
Digital Watermarks Enabling E-Commerce Strategies: Conditional and User Specific Access to Services and Resources

Author(s): Dittmann Jana | Steinebach Martin | Wohlmacher Petra | Ackermann Ralf
A survey and taxonomy of distributed certificate authorities in mobile ad hoc networks

Author(s): Masdari Mohammad | Jabbehdari Sam | Ahmadi Mohammad | Hashemi Seyyed | Bagherzadeh Jamshid | Khadem-Zadeh Ahmad
In Situ Key Establishment in Large-Scale Sensor Networks

Author(s): Xiang Yingchang | Liu Fang | Cheng Xiuzhen | Chen Dechang | Du DavidHC
Tree Based Protocol for Key Management in Wireless Sensor Networks

Author(s): Messai M-L | Aliouat M | Seba H
Cryptanalysis of the Two-Dimensional Circulation Encryption Algorithm

Author(s): De Cannière Christophe | Lano Joseph | Preneel Bart
A Secure Watermarking Scheme for Buyer-Seller Identification and Copyright Protection

Author(s): Ahmed Fawad | Sattar Farook | Siyal Mohammed Yakoob | Yu Dan
Analysis on DNA based Cryptography to Secure Data Transmission

Author(s): S.Jeevidha | Dr.M.S.Saleem Basha | Dr.P.Dhavachelvan
Design and Implementation of an Electronic Identification Card

Author(s): J. Flores‐Escalante | J. Pérez‐Díaz | R. Gómez‐Cárdenas
Enhancing Confidentiality of Private Communication through Dual Compression

Author(s): Kristipati Sudharshana Reddy | Munwar Sk | Rajesh Bhakthavatsalam
AN ANALYSIS OF THE DESIGN FACTORS AFFECTING THE PERFORMANCE OF CRYPTOSYSTEMS

Author(s): S.G.Srikantaswamy | Prof. H.D.Phaneendra
Biometry, the safe key

Author(s): María Fraile-Hurtado | Miguel Herrero-Langreo | Pilar Menéndez-Miguel | Valerio Delgado-Villanueva
Security Threats and its Countermeasures in Wireless Sensor Networks: An Overview

Author(s): S.V.Annlin Jeba | B. Paramasivan | D.Usha
Cryptographic Scheme for Digital Signals using Finite State Machines

Author(s): B.Krishna Gandhi | Dr.A.Chandra Sekhar | S.Srilakshmi
Ergodic Matrix and Hybrid-key Based Image Cryptosystem

Author(s): Xiaoyi Zhou | Jixin Ma | Wencai Du | Yongzhe Zhao
A PKI-based Track and Trace Network for Cross-boundary Container Security

Author(s): S.L. Ting | W.H. Ip | W.H.K. Lam | E.W.T. Ngai
Why do you need a reservation system?      Save time & money - Smart Internet Solutions