Data security in local area network based on fast encryption algorithm

G Ramesh, R Umarani - Recent Trends in Network Security and …, 2010 - Springer
Hacking is one of the greatest problems in the wireless local area networks. Many
algorithms have been used to prevent the outside attacks to eavesdrop or prevent the data …

[PDF][PDF] Taxonomy of cryptography techniques for network security

K Sharma, N Bahl - … Journal of Engineering and Computer Science, 2016 - academia.edu
Cryptography is the art of secret writing. Data encryption means that only a person having
the secret code or key can read scrambled information. The important role of cryptography is …

[PDF][PDF] A comparative study of six most common symmetric encryption algorithms across different platforms

G Ramesh, R Umarani - International Journal of Computer Applications, 2012 - Citeseer
The hacking is the greatest problem in the wireless local area network(WLAN). Many
algorithms like RC6, UMARAM, DES, 3DES, RC2 and UR5 have been used to prevent the …

[PDF][PDF] Comparison of Various Encryption Algorithms and Techniques for improving secured data Communication

S Koko, A Babiker - IOSR Journal of Computer Engineering (IOSR …, 2015 - academia.edu
Information security is the process of protecting information. It protects its availability, privacy
and integrity. Access to stored information on computer databases has increased greatly …

[PDF][PDF] Superiority of blowfish algorithm in wireless networks

G Singh, AK Singla, KS Sandha - International Journal of …, 2012 - researchgate.net
Encryption algorithm plays a crucial role in information security which guarantees the recent
growing internet and network applications. They are used to secure the data in wireless …

[PDF][PDF] Comparison of encryption algorithms: AES, Blowfish and Twofish for security of wireless networks

A Ghosh - International Research Journal of Engineering …, 2020 - researchgate.net
Encryption is the process of encoding data to prevent unauthorized access. Cyber security is
the need of the hour which ensures transfer of data across the internet with confidentiality …

[PDF][PDF] A new hybrid data encryption and decryption technique to enhance data security in communication networks: algorithm development

B Adedeji Kazeem, P Akinlolu - Int. J. Sci. Eng. Res, 2014 - researchgate.net
Data security is an important aspect of communication system that has always been a focus
for exchanging information among parties at location physically apart. In today's competitive …

[PDF][PDF] An Encryption Algorithm for Secure Data Transmission

R Rayarikar, S Upadhyay, D Shah - International Journal of …, 2012 - academia.edu
Encryption is of prime importance when confidential data is transmitted over the network.
Varied encryption algorithms like AES, DES, RC4 and others are available for the same. The …

[PDF][PDF] Symmetric Key Cryptography Algorithm Using Complement For Small Data Security

N Bhaskar - International Journal of Engineering Research & …, 2013 - researchgate.net
During data transmission between the source and the destination in computer network, the
data is exposed to external modifications with malicious intentions. In today's world, most of …

[PDF][PDF] An encryption algorithm for end-to-end secure data transmission in manet

R Rayarikar, A Bokil - International Journal of Computer Applications, 2012 - Citeseer
Encryption is of prime importance when confidential data is transmitted over wireless
network. Numerous encryption algorithms like AES, DES, RC4 and others are available for …