Implementation of a blockchain system using improved elliptic curve cryptography algorithm for the performance assessment of the students in the e-learning platform

MY Alshahrani - Applied Sciences, 2021 - mdpi.com
Blockchain technology allows for the decentralized creation of a propagated record of digital
events, in which third parties do not control information and associated transactions. This …

[PDF][PDF] A New Model Based Encryption Mechanism With Time Stamp, Acknowledgement Support.

AVN Krishna, AV Babu - Int. J. Netw. Secur., 2010 - Citeseer
In this work a model is going to be used which develops data distributed over a identified
value which is used as nonce (IV). By properly considering an empirical value, data is …

A New Non linear, time stamped & feed back Model Based encryption Mechanism with Acknowledgement support

AVN Krishna, AV Babu - arXiv preprint arXiv:1010.3862, 2010 - arxiv.org
In this work a model is going to be used which develops data distributed over a identified
value which is used as nonce (IV). The model considers an equilibrium equation which is a …

[PDF][PDF] Training of a New Probobilistic Encryption Scheme Using a Optimal Matrix Key

AVN Krishna, BA Vinaya - Computer Sciences and …, 2009 - scholar.archive.org
In this work the probabilistic encryption algorithm is presented. Essentially a cryptosystem
that is probabilistic secured means that it may be possible to modify a cipher text into …

Role of Statistical tests in Estimation of the Security of a New Encryption Algorithm

AVN Krishna, AV Babu - arXiv preprint arXiv:1007.0411, 2010 - arxiv.org
Encryption study basically deals with three levels of algorithms. The first algorithm deals with
encryption mechanism, second deals with decryption Mechanism and the third discusses …

[PDF][PDF] Probabilistic Encryption and Decryption for Message Decoding

VG Valley - jvwu.ac.in
In the current scenario of the world, the technologies have advanced so much that most of
the people prefer working with the internet as the main medium to transfer data or messages …

[PDF][PDF] A Study on E-Learning using Cloud Computing

SJ Swamy, C Oak - academia.edu
E-Learning is an efficiently growing tool used for learning. Although with great power comes
greater responsibilities because storing the amount of data of a particular subject will require …

[PDF][PDF] Study of the Effects of Noise on a New Model Based Encryption Mechanism with Time-Stamp and Acknowledgement Support in MANET & WSN Environment

AVN Krishna - International Journal of Advancements in …, 2011 - researchgate.net
In this work the encryption mechanism in MANET & WSN is considered. One of the very
important parameters with MANET & WSN is its low computing power availability in its real …

Analysis and performance evaluation of cryptographic algorithms for secure two party communications

MFA Sheikh, SK Sharma - 2017 International Conference on …, 2017 - ieeexplore.ieee.org
Security techniques have more than a particular algorithm or protocol for encryption &
decryption purpose and as well as for generation of sub keys to be mapped to plain text to …

[PDF][PDF] Thesis Submitted to

AVN KRISHNA - 2018 - researchgate.net
Heterocyclic chemistry is a profile source for a large number of unusual, structurally complex
and bioactive molecules. Over the decades, the compounds emerged from this field hold …