SRP Rao, K Jyothi - 2022 Second International Conference on …, 2022 - ieeexplore.ieee.org
Today security and privacy of user from unauthorized access, corruption, or theft is becoming more crucial requirement due to increased use of internet and communication …
A Sarkar, BK Singh - Handbook of Computer Networks and Cyber Security …, 2020 - Springer
Security of information is provided by various cryptographic techniques. Symmetric key cryptography is one of such methods which require a shared secret key between two parties …
FG Hashad, O Zahran, S El-Rabaie… - Menoufia Journal of …, 2020 - journals.ekb.eg
Peoples' biometrics, such as fingerprints, are unique, as a result it can be used in many evidence security requests, such as employees' registration gate, crime investigation, and …
C Neethu - 2018 International Conference on Control, Power …, 2018 - ieeexplore.ieee.org
Ensuring network and information security is one of the top most concerns related to data transmission. Cryptography is most effective solution for secure data transmission. Efficient …