Academic Journals Database
Disseminating quality controlled scientific knowledge

Search Articles for "Encryption"

ADD TO MY LIST
 
Technology of Electronic Signatur

Author(s): Ladislav Schwartz | Dusan Trstensky | Jaroslav Sadovsky
Dynamic Circuit Specialisation for Key-Based Encryption Algorithms and DNA Alignment

Author(s): Tom Davidson | Fatma Abouelella | Karel Bruneel | Dirk Stroobandt
A Hyper Modern Cryptography Algorithm to Improved Data Security: HMCA

Author(s): Vishwa Gupta | Gajendra Singh | Ravindra Gupta
Analysis of Software Realized DSA Algorithm for Digital Signature

Author(s): Bojan R. Pajčin | Predrag N. Ivaniš
Chaotic Image Encryption Design Using Tompkins-Paige Algorithm

Author(s): Shahram Etemadi Borujeni | Mohammad Eshghi
A Cryptographic Scheme of Finite Fields using Logical Operators

Author(s): G.Naga Lakshmi | B.Ravi Kumar | Ch.Suneetha | A.Chandra Sekhar
TextIndependent Speaker Recognition for Low SNR Environments with Encryption

Author(s): Aman Chadha | Divya Jyoti | M. Mani Roja
Improved Image Encryption Algorithm using Chaotic Map

Author(s): Joshi Rohit A | Joshi Sumit S | G. P. Bhole
Key Generation for Text Encryption in Cellular Networks using Multipoint Crossover Function

Author(s): Y.V. Srinivasa Murthy | Dr. S. C. Satapathy | P. Srinivasu | A.A.S. Saranya
An Optimized Method for Concealing Data using Audio Steganography

Author(s): Md. Shafakhatullah Khan | V.Vijaya Bhasker | V. Shiva Nagaraju
A Block Cipher Using Graph Structures and Logical XOR Operation

Author(s): CH. Suneetha | D. Sravan Kumar | A.Chandra sekhar
Dynamic Video Conferencing with Fully Secured Encryption Algorithms

Author(s): Y.V. Srinivasa Murthy | Dr. S. C. Satapathy | Ch Rajesh | P Tejnadh Reddy
The Effective and Efficient Security Services For Cloud Computing

Author(s): Sambhaji Sarode | Deepali Giri | Khushbu Chopde
Intrusion Detection System for Ad hoc Mobile Networks

Author(s): Muhammad Nawaz Khan | Muhammad Ilyas Khatak | Muhammad Faisal
Secure Key Transport in Symmetric Cryptographic Protocols using some Elliptic Curves over finite fields

Author(s): Ch. Suneetha | D. Sravana Kumar | A. Chandrasekhar | K. Vanitha
DNA Computing based Elliptic Curve Cryptography

Author(s): P. Vijayakumar | V. Vijayalakshmi | G. Zayaraz
A proposed Modified Data Encryption Standard algorithm by Using Fusing Data Techniqu

Author(s): Alaa H. AL-Hamami | Mohammad A. AL-Hamami | Soukaena H. Hashem
ANALYSIS OF DIFFERENT PRIVACY PRESERVING CLOUD STORAGE FRAMEWORKS

Author(s): Rajeev Bedi | Mohit Marwaha | Tajinder Singh | Harwinder Singh | Amritpal Singh
Format-compliant Privacy Protection of Traffic Surveillance Video using JPEG 2000

Author(s): Zhiguo Chang | Zhanwen Liu | Zongtao Duan | Jian Xu
Halftone based Secret Sharing Visual Cryptographic Scheme for Color Image using Bit Analysis

Author(s): Pavan Kumar Gupta | Naveen Hemrajani | Savita Shiwani | Ruchi Davey
A CONFIGURABLE SECURED IMAGE ENCRYPTION TECHNIQUE USING 3D ARRAY BLOCK ROTATION

Author(s): G. Lokeshwari | Dr. S. Udaya Kumar | G. Aparna
CRYPTOGRAPHIC PROTOCOLS USING ELLIPTIC CURVE OVER FINITE FIELDS

Author(s): D. SRAVANA KUMAR | CH. SUNEETHA | A.CHANDRASEKHAR
ENCRYPTIONS OF DATA STREAMS USING PAULI SPIN ½ MATRICES AND FINITE STATE MACHINE

Author(s): B. Krishna Gandhi | A. Chandra Sekhar | S. Sri lakshmi
Controlling IP Spoofing through PACKET Filtering

Author(s): Mridu Sahu | Rainey C. Lal
Design and Implementation of RF Deployed SMS Based Equipment Controller

Author(s): Sadeque Reza Khan | Ahmed Al Mansur | Muhammad Towhidur Rahman
Public Key Cryptosystem Technique Elliptic Curve Cryptography with Generator g for Image Encryption

Author(s): Vinod Kumar Yadav | Dr. A.K. Malviya | D.L. Gupta | Satyendra Singh | Ganesh Chandra
Visual cryptography for color images by dithering techniques

Author(s): Lakshmi Priya Tadiboyna | M. Deena Babu
Technology of Electronic Signatur

Author(s): Ladislav Schwartz | Dusan Trstensky | Jaroslav Sadovsky
High Security Image Steganography with Modified Arnold's Cat Map

Author(s): Minati Mishra | Ashanta Ranjan Routray | Sunit Kumar
Enhancing Security Measures by Tunnelling Protocol in Distributed Grid Network

Author(s): T. Mohan Raj | S. Shahul Hammed | Amala Deepan
Bluetooth Security Threats And Solutions: A Survey

Author(s): Nateq Be-Nazir Ibn Minar | Mohammed Tarique
Encryption Of Data Using Elliptic Curve Over Finite Fields

Author(s): D. Sravana Kumar | CH. Suneetha | A. ChandrasekhAR
Optimizing One Fair Document Exchange Protocol

Author(s): Abdullah M. Alaraj
A Security Suite for Wireless Body Area Networks

Author(s): Raghav V. Sampangi | Saurabh Dey | Shalini R. Urs | Srinivas Sampalli
A New Image Encryption Scheme for Secure Digital Images Based on Combination of Polynomial Chaotic Maps

Author(s): Ahmed A. Abd El-Latif | Li Li | Ning Wang | Jia-Liang Peng | Zhenfeng Shi | Xiamu Niu
CLASSICAL AND QUANTUM COMMUNICATIONS IN GRID COMPUTING

Author(s): MIHAI OCTAVIAN DIMA | MARIAN PETRE | DORINA ARANGHEL | BOGDAN MITRICA | MIHNEA DULEA | CARMELIA PETRE | MIHAELA STOICA | MIRCEA UDREA | RODICA STERIAN | PAUL STERIAN | CHIVUTA RAMONA BADITA
A NOVEL SCHEME FOR TEXT DATA ENCRYPTION

Author(s): Saptarshi Naskar
Using SRAM Based FPGAs for Power-Aware High Performance Wireless Sensor Networks

Author(s): Juan Valverde | Andres Otero | Miguel Lopez | Jorge Portilla | Eduardo de la Torre | Teresa Riesgo
A New Approach for Improving Data Security using Iterative Blowfish Algorithm

Author(s): G. Manikandan | N. Sairam | M. Kamarasan
AN ALGORITHM FOR DIGITAL WATERMARKING OF STILL IMAGES FOR COPYRIGHT PROTECTION

Author(s): Jahnvi Sen | A.M. Sen | K. Hemachandran
SECURED TREE BASED KEY MANAGEMENT IN WIRELESS BROADCAST SERVICES

Author(s): K.Vijaya Babu | O. Srinivasa Rao | Dr. MHM Krishna Prasad
Using Cipher Key to Generate Dynamic S-Box in AES Cipher System

Author(s): Razi Hosseinkhani | H. Haj Seyyed Javadi
IMPLEMENTATION OF THE TRIPLE-DES BLOCK CIPHER USING VHDL

Author(s): Sai Praveen Venigalla | M. Nagesh Babu | Srinivas Boddu | G. Santhi Swaroop Vemana
Segment Based Visual Cryptography For Key Distribution

Author(s): Sesha Pallavi Indrakanti | Avadhani P S
A Hybrid Image Cryptosystem Based On OMFLIP Permutation Cipher

Author(s): G.Sudheer | B.V.S.Renuka Devi
Security issues in Cloud Computing

Author(s): Kalyani D. Kadam | Sonia K. Gajre | R. L. Paikrao
Noise deduction using Quantum check Bits

Author(s): T.Godhavari | N.R.Alamelu
Real time Video Streaming using Novel approach

Author(s): Mukesh Kumar | Jain Akash | B.A.Khivsara | Magar Padmakar | Baphana Abliasaha
An improved approach for Extended Visual Cryptography Scheme for Colour Images

Author(s): Bhandare Shital | Jhade Manoj | Jadhav Angarika
A Novel Approach for Iris Encryption

Author(s): Shrinivasrao B. Kulkarni | Ravindra S. Hegadi | Umakant P. Kulkarni
Security Enhancement Algorithms for Data Transmission for Next Generation Networks

Author(s): Vikas Kaul | S K Narayankhedkar | S Achrekar | S Agarwal
A Smart and Secure Wireless Communication System: Cognitive Radio

Author(s): Shrikrishan Yadav | Santosh Kumar Singh | Krishna Chandra Roy
Hardware Implementation of Mix Column Step in AES

Author(s): Pratap Kumar Dakua | Manoranjan Pradhan | Subba Rao Polamuri
An Approach for SMS Security using Authentication Functions

Author(s): Neetesh Saxena | Narendra S. Chaudhari
New Approach of Data Encryption Standard Algorithm

Author(s): Shah Kruti R | Bhavika Gambhava
A Cryptographic Algorithm based onBilinear Transformation

Author(s): Phani krishna kishore M | Venugopal IVS
Scheme of Encryption for Block Ciphers and Multi Code Generation Based on Secret Key

Author(s): P. Anuradha Kameswari | R. Chaya Kumari | L. Praveen Kumar
ECAKP: Encrypt Collect Authenticate Kill Play

Author(s): Mahmoud Mohamed El-Khouly
Implimentation of Cryptographic Algorithm for GSM and UMTS Systems.

Author(s): Alpesh R. Sankaliya | V.Mishra | Abhilash Mandloi
Role of Multiple Encryption in Secure Electronic Transaction

Author(s): Himanshu Gupta | Vinod Kumar Sharma
Robust Secure and Blind Watermarking Based on DWT DCT Partial Multi Map Chaotic Encryption

Author(s): Esam A. Hagras | M. S. El-Mahallawy | A. Zein Eldin | M. W. Fakhr
Experimental Study of Various Data Masking Techniques with Random Replacement using Data Volume

Author(s): Ravikumar G K | B. Justus Rabi | Ravindra S. Hegadi | Manjunath T.N | Archana R A
Efficient Cryptographic Technique for Securing and Accessing Outsourced Data

Author(s): Hasan Omar Al-Sakran | Fahad Bin Muhaya | Irina Serguievskaia
Theoretical Implementation of the Rijndael Algorithm Using GPU Processing

Author(s): MANG Erica | MANG Ioan | ANDRONIC Bogdan | POPESCU Constantin
Chaotic Encryption Scheme Using 1-D Chaotic Map

Author(s): Mina Mishra | Vijay H. Mankar
New Approach for Fast Color Image Encryption Using Chaotic Map

Author(s): Kamlesh Gupta | Sanjay Silakari
On Secure Digital Image Watermarking Techniques

Author(s): Manjit Thapa | Sandeep Kumar Sood
A Survey of Homomorphic Encryption for Nonspecialists

Author(s): Fontaine Caroline | Galand Fabien
Anonymous Fingerprinting with Robust QIM Watermarking Techniques

Author(s): Prins JP | Erkin Z | Lagendijk RL
Oblivious Neural Network Computing via Homomorphic Encryption

Author(s): Orlandi C | Piva A | Barni M
Transmission Error and Compression Robustness of 2D Chaotic Map Image Encryption Schemes

Author(s): Gschwandtner Michael | Uhl Andreas | Wild Peter
Digital Video Encryption Algorithms Based on Correlation-Preserving Permutations

Author(s): Socek Daniel | Magliveras Spyros | Ćulibrk Dubravko | Marques Oge | Kalva Hari | Furht Borko
Protection and Retrieval of Encrypted Multimedia Content: When Cryptography Meets Signal Processing

Author(s): Erkin Zekeriya | Piva Alessandro | Katzenbeisser Stefan | Lagendijk RL | Shokrollahi Jamshid | Neven Gregory | Barni Mauro
Joint Encryption and Compression of Correlated Sources with Side Information

Author(s): Haleem MA | Subbalakshmi KP | Chandramouli R
Supporting Symmetric 128-bit AES in Networked Embedded Systems: An Elliptic Curve Key Establishment Protocol-on-Chip

Author(s): Duraisamy Roshan | Salcic Zoran | Strangio MaurizioAdriano | Morales-Sandoval Miguel
Compression Independent Reversible Encryption for Privacy in Video Surveillance

Author(s): Carrillo Paula | Kalva Hari | Magliveras Spyros
Anonymous Biometric Access Control

Author(s): Ye Shuiming | Luo Ying | Zhao Jian | Cheung Sen-ChingS
Overview on Selective Encryption of Image and Video: Challenges and Perspectives

Author(s): Massoudi A | Lefebvre F | De Vleeschouwer C | Macq B | Quisquater J-J
A DSP Based POD Implementation for High Speed Multimedia Communications

Author(s): Zhang Chang Nian | Li Hua | Zhang Nuannuan | Xie Jiesheng
On the Design of Error-Correcting Ciphers

Author(s): Mathur Chetan Nanjunda | Narayan Karthik | Subbalakshmi KP
MAC Security and Security Overhead Analysis in the IEEE 802.15.4 Wireless Sensor Networks

Author(s): Xiao Yang | Chen Hsiao-Hwa | Sun Bo | Wang Ruhai | Sethi Sakshi
Broadcast Secrecy via Key-Chain-Based Encryption in Single-Hop Wireless Sensor Networks

Author(s): Sivaraman Vijay | Ostry Diethelm | Shaheen Jaleel | Hianto AntoniJunior | Jha Sanjay
A Speed-Adaptive Media Encryption Scheme for Real-Time Recording and Playback System

Author(s): Xiao Chen | Lian Shiguo | Wang Lifeng | Ma Shilong | Lv Weifeng | Xu Ke
Cryptanalysis of the Two-Dimensional Circulation Encryption Algorithm

Author(s): De Cannière Christophe | Lano Joseph | Preneel Bart
Cryptanalysis of a New Signal Security System for Multimedia Data Transmission

Author(s): Li Chengqing | Li Shujun | Chen Guanrong | Chen Gang | Hu Lei
Why do you need a reservation system?      Affiliate Program