[PDF][PDF] An efficient video data security mechanism based on RP-AES

A Yadav, M Verma, K Patidar - International journal of advanced …, 2016 - academia.edu
Video security is an important aspect of communication now days. As the area is complex
due to the nature of video and its file format. So there is a wide scope in this area …

[PDF][PDF] A Survey on Malware & Session Hijack Attack over WebEnvironments

J Kushwaha, D Soni - IOSR Journal of Computer Engineering (IOSR …, 2018 - academia.edu
Web applications are very effective means of nitration between end-users. Today social
networking based web applications are very popular due to its user friendly behavior but in …

Security in ad-hoc networks (MANETS)

PK Shukla, KR Bhatele - Next Generation Wireless Network Security …, 2015 - igi-global.com
Wireless Networks are vulnerable in nature, mainly due to the behavior of node
communicating through it. As a result, attacks with malicious intent have been and will be …

Encrypto–Decrypto

S Gupta, S Jain, S Singh, T Ikram - ICT Infrastructure and Computing …, 2022 - Springer
In present scenario, cybercrimes are increasing in every area of technology. Especially, in
text transfer, there is a high chance of a third party breach. Everyone needs to share …

[PDF][PDF] LAF Chat: A Message Encrypting Application Utilizing RSA Algorithm for Android-Based Mobile Device

RA Antenor, R Bautista, FP Lesaca… - Journal of Engineering …, 2018 - ph01.tci-thaijo.org
The researchers have decided to create an application for the sole purpose of protecting
once private information even as small as a basic text message. Using the Rivest Shamir …

[PDF][PDF] AN ILLUSTRATIVE REVIEWS ON CRYPTOGRAPHIC ALGORITHMS USED IN NETWORKING APPLICATIONS FOR SECURITY

M Kannan, KRS Kumar, T Rajalakshmi - academia.edu
The characteristics of network protection have evolved as a result of the exponential growth
in computing applications of mobile and wireless networks. There has been an uptick in …

Design of logistic map-based spreading sequence generation for use in wireless communication

K Kashayp, KK Sarma, MP Sarma - Next Generation Wireless …, 2015 - igi-global.com
Spread spectrum modulation (SSM) finds important place in wireless communication
primarily due to its application in Code Division Multiple Access (CDMA) and its …

A meta-analysis of video data security

A Yadav, K Patidar - International Journal of Advanced …, 2015 - search.proquest.com
Data Security is important in all field of data communication as it is very important so that any
unauthorized access of data can be prevented. There are several ways to secure the data in …

[PDF][PDF] XSS Attack Detection in JSP and PHP: A Meta-Analysis

H Gupta, D Tomar, AU Khan - International Journal of Scientific and …, 2015 - academia.edu
When data is uploaded from any means of data communication, data may be leaked or
attacked. Cross-site scripting (XSS) attacks are the most vulnerable types of attack found …

An efficient mechanism for Securing Video Data

A Agrawal, V Singh - International Journal of Advanced …, 2014 - search.proquest.com
Data security is an important concern today. In today's world, data has been exchanged in
several means like mail, data uploading, video exchange, image exchange etc. In this digital …