A review and comparative analysis of various encryption algorithms

R Bhanot, R Hans - International Journal of Security and Its Applications, 2015 - earticle.net
Now days, Data security is very challenging issue that touches many areas including
computers and communication. Recently, we came across many attacks on cyber security …

[PDF][PDF] A review on DES, AES and blowfish for image encryption & decryption

A Devi, A Sharma, A Rangra - International Journal of Computer Science …, 2015 - Citeseer
Network Security is the most vital component in information security because it is
responsible for securing all information passed through networked computers.[1] In this …

Securing Medical Data using Extended Role Based Access Control Model and Two fish Algorithms on Cloud Platform.

T Jayasankar, RM Bhavadharini… - European Journal of …, 2021 - go.gale.com
A great deal of data is generated and collected by devices connected to healthcare systems
on the Internet of Things (IoT). This data is distributed in real time, is unstructured in nature …

Technical Review on Symmetric and Asymmetric Cryptography Algorithms.

S Rani, H Kaur - … Journal of Advanced Research in Computer …, 2017 - search.ebscohost.com
If you want to keep your information safe and secret, you have the possible strategies are:
hide the existence of the information, or make the information unintelligible. Cryptography is …

[PDF][PDF] Critical analysis of various symmetric key cryptographic algorithms

P Nema, MA Rizvi - International Journal on Recent and Innovation …, 2015 - academia.edu
Current era is digital and has elite advancement in technology, almost in every field things
are becoming technology friendly. It is the need to provide security to sensitive information in …

Implementation and comparison of hybrid encryption model for secure network using AES and Elgamal.

S Rani, H Kaur - … Journal of Advanced Research in Computer …, 2017 - search.ebscohost.com
Cryptography is a concept to protect network and data transmission over network. Data
Security is the main aspect of securing data transmission over unreliable network …

" Online Transaction Security Enhancement": An Algorithm Based on Cryptography

Z Hasan, CP Agrawal, M Agrawal - … International Conference on …, 2019 - ieeexplore.ieee.org
Online transaction has become daily routine in our life. All of us are using online transaction
very frequently today, so to deal with related security issues like Authorization, data …

Perbandingan Algoritma Blowfish Dan Twofish Untuk Kriptografi File Gambar

M Muhathir - Journal of Informatics and Telecommunication …, 2018 - ojs.uma.ac.id
Masalah keamanan dan kerahasiaan data dan informasi merupakan suatu hal yang sangat
penting. Salah satu cara untuk menjaga data tersebut yaitu dengan teknik enkripsi dan …

[PDF][PDF] Efficient Selection of Compression-Encryption Algorithms for Securing Data Based on Various Parameters

RD Masram, J Abraham - College of Engineering, Pune, 2014 - coep.org.in
For faster communication and exchange of data, most of the information comes in the form of
electronic data. Most of the computer applications related to health are not secure and these …

RETRACTED: Survey on Encryption Approaches for Secure Face Biometrics

R Kavya, A George - IOP Conference Series: Materials Science …, 2018 - iopscience.iop.org
Biometric system is twisting up logically basic since they give strong moreover, compelling
techniques for character affirmations. The face recognition is the most trademark methods for …