Academic Journals Database
Disseminating quality controlled scientific knowledge

Search Articles for "Encryption and Decryption Algorithms"

ADD TO MY LIST
 
Performance Evaluation of Symmetric Encryption Algorithms

Author(s): D. S. Abdul. Elminaam | H. M. Abdul Kader | M. M. Hadhoud
Compression Independent Reversible Encryption for Privacy in Video Surveillance

Author(s): Paula Carrillo | Hari Kalva | Spyros Magliveras
A Digital Image Encryption Algorithm Based A Composition of Two Chaotic Logistic Maps

Author(s): Ismail Amr Ismail | Mohammed Amin | Hossam Diab
Studying the Effects of Most Common Encryption Algorithms

Author(s): Diaa Salama | Hatem Abdual Kader | Mohiy Hadhoud
Frame Based Symmetric Key Cryptography

Author(s): Uttam Kr. Mondal | Satyendra Nath Mandal | J. PalChoudhury | J.K.Mandal
Evaluating The Performance of Symmetric Encryption Algorithms

Author(s): Diaa Salama Abd Elminaam | Hatem Mohamed Abdual Kader | Mohiy Mohamed Hadhoud
Steganography Security for Copyright Protection of Digital Images Using DWT

Author(s): K.T.Talele, Dr.S.T.Gandhe, Dr.A.G.Keskar
Security Enhancement: Combining Cryptography and Steganography

Author(s): Dhawal Seth | L. Ramanathan | Abhishek Pandey
COMPARISON OF LOSSLESS DATA COMPRESSION ALGORITHMS FOR TEXT DATA

Author(s): S.R. Kodituwakku | U. S.Amarasinghe
Evaluating the Effects of Symmetric Cryptography Algorithms on Power Consumption for Different Data Types

Author(s): Diaa Salama Abdul Minaam | Hatem M. Abdual-Kader | Mohiy Mohamed Hadhoud
Real-Time DMB Video Encryption in Recording on PMP

Author(s): Seong-Yeon Lee | Jong-Nam Kim
Data Security in Ad Hoc Networks Using Randomization of Cryptographic Algorithms

Author(s): B. Ananda Krishna | S. Radha | K. Chenna Keshava Reddy
A Performance Study on AES Algorithms

Author(s): B.D.C.N.Prasad | P.E.S.N.krishna Prasad | P Sita Rama Murty | K Madhavi
New Frame Work of Hidden Data with in Non Multimedia File

Author(s): Hamdan.O.Alanazi , Hamid A.Jalab , A.A Zaidan and B.B Zaidan
NUMERIC TO NUMERIC ENCRYPTION OF DATABASES: Comparison of Standard Encryption and the Proposed 3Kdec Algorithms

Author(s): Dr. Himanshu Aggarwal, Kamaljit Kaur, Kanwalvir Singh Dhindsa, Ghanaya Singh
A Survey on Cryptography and Steganography Methods for Information Security

Author(s): Kallam Ravindra Babu | Dr. S.Udaya Kumar | Dr. A.Vinaya Babu
Efficient Hardware Design and Implementation of AES Cryptosystem

Author(s): Pravin B. Ghewari | Mrs. Jaymala K. Patil | Amit B. Chougule
A Hyper Modern Cryptography Algorithm to Improved Data Security: HMCA

Author(s): Vishwa Gupta | Gajendra Singh | Ravindra Gupta
TextIndependent Speaker Recognition for Low SNR Environments with Encryption

Author(s): Aman Chadha | Divya Jyoti | M. Mani Roja
Public Key Cryptosystem Technique Elliptic Curve Cryptography with Generator g for Image Encryption

Author(s): Vinod Kumar Yadav | Dr. A.K. Malviya | D.L. Gupta | Satyendra Singh | Ganesh Chandra
A Smart and Secure Wireless Communication System: Cognitive Radio

Author(s): Shrikrishan Yadav | Santosh Kumar Singh | Krishna Chandra Roy
New Approach of Data Encryption Standard Algorithm

Author(s): Shah Kruti R | Bhavika Gambhava
Theoretical Implementation of the Rijndael Algorithm Using GPU Processing

Author(s): MANG Erica | MANG Ioan | ANDRONIC Bogdan | POPESCU Constantin
Compression Independent Reversible Encryption for Privacy in Video Surveillance

Author(s): Carrillo Paula | Kalva Hari | Magliveras Spyros
AN ANALYSIS OF THE DESIGN FACTORS AFFECTING THE PERFORMANCE OF CRYPTOSYSTEMS

Author(s): S.G.Srikantaswamy | Prof. H.D.Phaneendra
Guest Editorial

Author(s): Jean-Henry Morin | Shiguo Lian | Xin Wang | David Llewellyn-Jones
A UNIFIED BLOCK AND STREAM CIPHER BASED FILE ENCRYPTION

Author(s): ganesan manikandan | ganesan krishnan | natarajan sairam
A New and Secure Cryptosystem for Image Encryption and Decryption

Author(s): Rao K | Kumar K | Murali Krishna P
Permutation based Image Encryption Technique

Author(s): Sesha Pallavi Indrakanti | P.S. Avadhani
IMPLEMENTATION OF OBJECT ORIENTED ENCRYPTION SYSTEM USING LAYERED CELLULAR AUTOMATA

Author(s): CHINTA SOMSWARA RAO | SRINIVASA RAO ATTADA | MADINA JAYANTHI RAO | KUNA NAGESWARA RAO
Probabilistic Encryption Based ECC Mechanism

Author(s): Addepalli V.N. Krishna
A Review on Cryptography Mechanisms

Author(s): Prof ML Sharma | Er. Sheetal Atri
A Novel Enhancement Technique of the Hill Cipher for Effective Cryptographic Purposes

Author(s): A. F.A. Abidin | O. Y. Chuan | M. R.K. Ariffin
Message Based Random Variable Length Key Encryption Algorithm

Author(s): Hamid Mirvaziri | Kasmiran J.M. Ismail | Zurina M. Hanapi
Challenges of Hidden Data in the Unused Area Two within Executable Files

Author(s): A. W. Naji | A. A. Zaidan | B. B. Zaidan
Save time & money - Smart Internet Solutions      Why do you need a reservation system?