Academic Journals Database
Disseminating quality controlled scientific knowledge

Search Articles for "Secret key"

ADD TO MY LIST
 
Error Free E-Messaging Technique using Symmetric Key Encryption- EHDES

Author(s): RamveerSingh | SanjiveTyagi | AwakashMishra | Deo Brat Ojha
Enciphered Data Steganography Using Secret Key

Author(s): BANGALORE G.Tilak | JAIN Vinod Kumar | HEBBAR K.Shreedhar
Design of An Efficient Neural Key Generation

Author(s): Asst. Prof. R. M.Jogdand1 | Sahana S.Bisalapur
AN ORDEAL RANDOM DATA ENCRYPTION SCHEME (ORDES)

Author(s): RAMVEER SINGH, | DEO BRAT OJHA
A NOVEL RSU ALGORITHM FOR SECURED COMMUNICATION

Author(s): SHREEDHAR H. K | RASHMI S.B, | UMARANI T.G
Strategic Security as a New Academic Discipline

Author(s): Dr. Sheldon Greaves
An Improved Pixel Sieve Method for Visual Cryptography

Author(s): Vaibhav Choudhary | Pravin Kumar | Kishore Kumar | D.S. Singh
Modified Pixel Sieve Method for Visual Cryptography

Author(s): Vaibhav Choudhary, | Kishore Kumar, | Pravin Kumar, | D.S. Singh
A Survey on Recent Security Trends using Quantum Cryptography

Author(s): T. Rubya | N. Prema Latha, | B. Sangeetha
ENCRYPTION OF DATA STREAMS USING PAULI SPINS ½ MATRICES

Author(s): D. Sravana Kurmar | CH. Suneetha, | A. Chandra Sekhar
QUANTUM CRYPTOGRAPHY BASED EMAIL COMMUNICATION THROUGH INTERNET

Author(s): V.ANUSUYA DEVI | T.SAMPRADEEPRAJ
Identity Based Color Image Cryptography

Author(s): Gopi Krishnan S | Loganathan D
Generate a key for MAC Algorithm using Biometric Fingerprint

Author(s): R.Seshadri | T.Raghu Trivedi
A New Watermarking Approach for Non-numeric Relational Database

Author(s): Rajneeshkaur Bedi | Anita Thengade | Dr. Vijay M.Wadhai
A Novel Technique for Embedding Data in Spatial Domain

Author(s): V.Madhu Viswanatham | Jeswanth Manikonda
A Bit-Serial Multiplier Architecture for Finite Fields Over Galois Fields

Author(s): Hero Modares | Yasser Salem | Rosli Salleh | Majid T. Shahgoli
Generation of key for Session key Distribution Using Bio-Metrics

Author(s): Dr.R.Seshadri, | T.Raghu Trivedi
A Novel Stegnosystem Design for Defying Differential Power Analysis Attacks on Smart Cards

Author(s): Hanan Mahmoud | Khaled Alghathbar | Alaaeldin Hafez
Substitution-diffusion based Image Cipher

Author(s): Narendra K Pareek | Vinod Patidar | Krishan K Sud
Image Encryption Based On Diffusion And Multiple Chaotic Maps

Author(s): G.A.Sathishkumar | K.Bhoopathy bagan | N.Sriraam
Image Encryption Using Differential Evolution Approach in Frequency Domain

Author(s): Ibrahim S I Abuhaiba | Maaly A S Hassan
A Three Party Authentication for Key Distributed Protocol Using Classical and Quantum Cryptography

Author(s): Suganya Ranganathan | Nagarajan Ramasamy | Senthil Karthick Kumar Arumugam | Balaji Dhanasekaran | Prabhu Ramalingam | Venkateswaran Radhakrishnan | Ramesh Kumar Karpuppiah
Retinal Biometrics based Authentication and Key Exchange System

Author(s): K. Saraswathi | B. Jayaram | R. Balasubramanian
An Authentication Mechanism to prevent SQL Injection Attacks

Author(s): Indrani Balasundaram | E. Ramaraj
Ultra Secured and Authentic Key Distribution Protocol using a Novel Secret Sharing Technique

Author(s): Prabir Kr. Naskar | Hari Narayan Khan | Ayan Chaudhuri | Atal Chaudhuri
Performance analysis of information reconciliation with interceptor in Quantum Key distribution

Author(s): Gouri Rani Barai, | Nadia Nowshin, | KaziMohitul Islam, | A K M Arifuzzman | PoompatSaengudomlert
An Improved Visual Cryptography Scheme for Secret Hiding

Author(s): G. Prasanna Lakshmi | J.A.Chandulal | KTV Reddy
An analytical survey on Network Security Enhancement Services

Author(s): Deshraj Ahirwar | Manish K. Ahirwar | Piyush K. Shukla | Pankaj Richharia
Three Party Authentication Key Distributed Protocols Using Implicit and Explicit Quantum Cryptography

Author(s): Dr.G.Ananda Rao, | Y.Srinivas, | J.Vijaya Sekhar, | Ch.Pavan Kumar
One Time Secret Key Mechanism for Mobile Communication

Author(s): Vasu.R | Sunitha Abburu
A NEW VARIANT OF SUBSET-SUM CRYPTOSYSTEM OVER RSA

Author(s): Sonal Sharma | Saroj Hiranwal | Prashant Sharma
Secure Key Transport in Symmetric Cryptographic Protocols using some Elliptic Curves over finite fields

Author(s): Ch. Suneetha | D. Sravana Kumar | A. Chandrasekhar | K. Vanitha
A Unique Approach for Watermarking Nonnumeric Relational Database

Author(s): Rajneesh Kaur Bedi | Purva Gujarathi | Poonam Gundecha | Ashish Kulkarni
Halftone based Secret Sharing Visual Cryptographic Scheme for Color Image using Bit Analysis

Author(s): Pavan Kumar Gupta | Naveen Hemrajani | Savita Shiwani | Ruchi Davey
A Spatial Domain Image Steganography Technique Based on Matrix Embedding and Huffman Encoding

Author(s): P.Nithyanandam, T.Ravichandran, N.M.Santron, E. Priyadharshini
CRYPTOGRAPHIC PROTOCOLS USING ELLIPTIC CURVE OVER FINITE FIELDS

Author(s): D. SRAVANA KUMAR | CH. SUNEETHA | A.CHANDRASEKHAR
ENCRYPTIONS OF DATA STREAMS USING PAULI SPIN ½ MATRICES AND FINITE STATE MACHINE

Author(s): B. Krishna Gandhi | A. Chandra Sekhar | S. Sri lakshmi
Design of Digital Signature Algorithm by Fractals and Chaos Theory

Author(s): Dr. G. Geetha | K. Thamizhchelvy
Secret Key Agreement Over Multipath Channels Exploiting a Variable-Directional Antenna

Author(s): Valery Korzhik | Viktor Yakovlev | Yuri Kovajkin | Guillermo Morales-Luna
A Session Based Multiple Image Hiding Technique using DWT and DCT

Author(s): Tanmay Bhattacharya | Nilanjan Dey | S. R. Bhadra Chaudhuri
Encryption Of Data Using Elliptic Curve Over Finite Fields

Author(s): D. Sravana Kumar | CH. Suneetha | A. ChandrasekhAR
CLASSICAL AND QUANTUM COMMUNICATIONS IN GRID COMPUTING

Author(s): MIHAI OCTAVIAN DIMA | MARIAN PETRE | DORINA ARANGHEL | BOGDAN MITRICA | MIHNEA DULEA | CARMELIA PETRE | MIHAELA STOICA | MIRCEA UDREA | RODICA STERIAN | PAUL STERIAN | CHIVUTA RAMONA BADITA
LSB Replacement Stegnography in an Image using Pseudorandomised Key Generation

Author(s): B. Karthikeyan | V. Vaithiyanathan | B. Thamotharan | M. Gomathymeenakshi | S. Sruti
Segment Based Visual Cryptography For Key Distribution

Author(s): Sesha Pallavi Indrakanti | Avadhani P S
Image Stenography Skin Tone Detection

Author(s): DEEPALI BHAMARE | VIKAS GUPTA | P.B.SALUNKHE
Secured and Authenticated Sharing of Software Program

Author(s): Madhavi Gangurde | Umashankar prasad | Ranvir Kumar | Prashant Prajapati
An Approach for SMS Security using Authentication Functions

Author(s): Neetesh Saxena | Narendra S. Chaudhari
Proactive Secret Sharing Scheme for Mobile Ad-hoc Networks

Author(s): Chauhan Gargi K | H. M. Diwanji
Scheme of Encryption for Block Ciphers and Multi Code Generation Based on Secret Key

Author(s): P. Anuradha Kameswari | R. Chaya Kumari | L. Praveen Kumar
Breaking the BOWS Watermarking System: Key Guessing and Sensitivity Attacks

Author(s): Comesaña Pedro | Pérez-González Fernando
Watermarking-Based Digital Audio Data Authentication

Author(s): Steinebach Martin | Dittmann Jana
Secret Sharing over Fast-Fading MIMO Wiretap Channels

Author(s): Wong TanF | Bloch Matthieu | Shea JohnM
Constructing UC Secure and Constant-Round Group Key Exchange Protocols via Secret Sharing

Author(s): Cao Chunjie | Yang Chao | Ma Jianfeng | Moon Sangjae
Dynamic Session-Key Generation for Wireless Sensor Networks

Author(s): Chen Chin-Ling | Li Cheng-Ta
A Novel Session Based Dual Image Encoding and Hiding Technique Using DWT and Spread Spectrum

Author(s): Tanmay Bhattacharya | Nilanjan Dey | S. R. Bhadra Chaudhuri
A Receiptfree MultiAuthority EVoting System

Author(s): Adewole A. Philip | Sodiya Adesina Simon | Arowolo Oluremi. A.
Secret Key Establishment for Symmetric Encryption over Adhoc Networks

Author(s): Sunil Taneja | Ashwani Kush | C. Jinshong Hwang
Marketing in Medical Imaging Industry

Author(s): Shahrokh Aflaki
Cryptographic Scheme for Digital Signals using Finite State Machines

Author(s): B.Krishna Gandhi | Dr.A.Chandra Sekhar | S.Srilakshmi
A Novel Approach for Security Development for Multimedia System

Author(s): B.Prabhavathi | P.D.Chidhambara Rao | P.Raja Sekhar | Ishrath Jahan | G.Murali Mohan
A WAVELET BASED HYBRID SVD ALGORITHM FOR DIGITAL IMAGE WATERMARKING

Author(s): S.Ramakrishnan | T.Gopalakrishnan | K.Balasamy
Kryptos+Graphein= Cryptography

Author(s): Shweta Aggarwal | Utkarsh Jaiswal
Components Based Key Management Algorithm for Storage Area Networks

Author(s): P. Mahalingam | Dr. N. Jayaprakash | Dr. S. Karthikeyan
Guest Editorial

Author(s): Deepak Garg
A Threshold Signature Scheme with a Weakened Trusted Party

Author(s): Yongquan Cai | Fulai Cheng
Some Modification in ID-Based Public key Cryptosystem using IFP and DDLP

Author(s): Chandrashekhar Meshram | S.A. Meshram
Permutation based Image Encryption Technique

Author(s): Sesha Pallavi Indrakanti | P.S. Avadhani
Enhanced Fast and Secure Hybrid Encryption Algorithm for Message Communication

Author(s): Shaik Rasool | Md Ateeq ur Rahman | G. Sridhar | K. Hemanth Kunar
Shared Cryptography with Embedded Session Key for Secret Audio

Author(s): Prabir Kr. Naskar | Hari Narayan Khan | Ujjal Roy | Ayan Chaudhuri | Atal Chaudhuri
Grid based Approach for Data Confidentiality

Author(s): Sreelatha Malempati | Shashi Mogalla
Sec.AODV for MANETs using MD5 with Cryptography

Author(s): Suketu D. Nayak | Ravindra K. Gupta
WEP and WPA Improvement

Author(s): Mustafa ElGili | Samani A. Talab | Awad H. Ali
INFORMATION SECURITY PLAN FOR FLIGHT SIMULATOR APPLICATIONS

Author(s): Jason Slaughter | Syed (Shawon) M. Rahman
A new secure and practical electronic voting protocol without revealing voters identity

Author(s): Sadegh Jafari, | Jaber Karimpour, | Nasour Bagheri
Secure Routing Scheme in MANETs using Secret Key Sharing

Author(s): A. Amuthan | B.Aravind Baradwaj
Generating PNS for Secret Key Cryptography Using Cellular Automaton

Author(s): Bijayalaxmi Kar | D.Chandrasekhra Rao | Dr. Amiya Kumar Rath
Secure Group Key Management for Dynamic Sensor Networks

Author(s): N. Suganthi | V. Sumathi | R S. Mohanapriyha
Why do you need a reservation system?      Affiliate Program