In this work a model is going to be used which develops data distributed over a identified value which is used as nonce (IV). By properly considering an empirical value, data is …
In this work a model is going to be used which develops data distributed over a identified value which is used as nonce (IV). The model considers an equilibrium equation which is a …
In this work the probabilistic encryption algorithm is presented. Essentially a cryptosystem that is probabilistic secured means that it may be possible to modify a cipher text into …
Encryption study basically deals with three levels of algorithms. The first algorithm deals with encryption mechanism, second deals with decryption Mechanism and the third discusses …
In the current scenario of the world, the technologies have advanced so much that most of the people prefer working with the internet as the main medium to transfer data or messages …
E-Learning is an efficiently growing tool used for learning. Although with great power comes greater responsibilities because storing the amount of data of a particular subject will require …
AVN Krishna - International Journal of Advancements in …, 2011 - researchgate.net
In this work the encryption mechanism in MANET & WSN is considered. One of the very important parameters with MANET & WSN is its low computing power availability in its real …
MFA Sheikh, SK Sharma - 2017 International Conference on …, 2017 - ieeexplore.ieee.org
Security techniques have more than a particular algorithm or protocol for encryption & decryption purpose and as well as for generation of sub keys to be mapped to plain text to …
Heterocyclic chemistry is a profile source for a large number of unusual, structurally complex and bioactive molecules. Over the decades, the compounds emerged from this field hold …