S Mewada, P Sharma, SS Gautam - International Journal of …, 2016 - academia.edu
Security threats have been a major concern as a result of emergence of technology in every aspect including internet market, computational and communication technologies. To solve …
Security is the most challenging aspects in the internet and network application. Internet and networks applications are growing very fast, so the importance and the value of the …
NA Kofahi, T Al-Somani, K Al-Zamil - Journal of Discrete …, 2004 - Taylor & Francis
In this research work, implementation of three symmetric, block encryption algorithms namely: DES, Triple-DES and Blowfish under Linux platform is presented. A comparison is …
A Baksi - 2021 IFIP/IEEE 29th International Conference on Very …, 2021 - ieeexplore.ieee.org
Symmetric key cryptography is one of the cornerstones of security in the modern era of electronic communication. The symmetric key algorithms, known as the ciphers, are to …
Y Bharadwaj, S Chakraverty - 2013 International Conference …, 2013 - ieeexplore.ieee.org
Symmetric encryption is widely used to enforce data security and provide other cryptographic primitives. Despite significant research that has led to the development of …
AR Wani, QP Rana, N Pandey - Soft Computing: Theories and …, 2019 - Springer
Cloud computing environment is adopted by a large number of organizations, so the rapid transition toward the cloud has fueled concerns on security perspective. Encryption …
S Farah, Y Javed, A Shamim… - Recent Advances in …, 2012 - researchgate.net
This paper presents the evaluation of RSA, ElGamal & Pallier asymmetric encryption algorithms. Encryption algorithms provide a secure communication over the internet and …