[PDF][PDF] Image encryption using chaotic based artificial neural network

M Chauhan, R Prajapati - Int. J. Sci. Eng. Res, 2014 - academia.edu
Cryptography is the science to transform the information in secure way. Encryption is best
alternative to convert the data to be transferred to cipher data which is an unintelligible …

Neural Synchronization based secret key exchange over public channels: A Survey

S Chakraborty, J Dalal, B Sarkar… - … Conference on Signal …, 2014 - ieeexplore.ieee.org
Exchange of secret keys over public channels based on neural synchronization using a
variety of learning rules offer an appealing alternative to number theory based cryptography …

An adaptive genetic key based neural encryption for online wireless communication (AGKNE)

JK Mandal, A Sarkar - … on Recent Trends in Information Systems, 2011 - ieeexplore.ieee.org
In this paper, a genetic secret key based technique for neural encryption (AGKNE) has been
proposed for online transmission of data/information in wireless communication. In this …

Key generation and certification using multilayer perceptron in wireless communication (KGCMLP)

A Sarkar, JK Mandal - arXiv preprint arXiv:1211.4723, 2012 - arxiv.org
In this paper, a key generation and certification technique using multilayer perceptron
(KGCMLP) has been proposed in wireless communication of data/information. In this …

Object Oriented Modelling of Idea using GA based efficient key generation for e-governance security (OOMIG)

A Sarkar, S Karforma, JK Mandal - arXiv preprint arXiv:1204.1797, 2012 - arxiv.org
Nowadays different state and central government in India as well as abroad are taking
initiative to deliver different kind of services electronically specially using Information and …

[PDF][PDF] Cryptanalysis of key exchange method in wireless communication

A Sarkar, JK Mandal - Compare, 2015 - ijns.jalaxy.com.tw
In this paper, a cryptanalysis of key exchange method using multilayer perceptron (CKE) has
been proposed in wireless communication of data/information. In this proposed CKE …

Computational intelligence based triple layer perceptron model coordinated PSO guided metamorphosed based application in cryptographic technique for secured …

A Sarkar, JK Mandal - Procedia Technology, 2013 - Elsevier
In this paper, a triple layer perceptron model harmonized one time session key guided
metamorphosed based encryption technique using PSO generated key stream (TLPPSO) …

[PDF][PDF] Neuro Genetic Key Based Recursive Modulo-2 Substitution Using Mutated Character for Online Wireless Communication (NGKRMSMC)

A Sarkar, JK Mandal - International Journal of Computational Science …, 2014 - academia.edu
In this paper, a neural genetic key based technique for encryption (NGKRMSMC) has been
proposed through recursive modulo-2 substitution using mutated character code generation …

Multilayer Perceptron Guided Key Generation Through Mutation with Recursive Replacement in Wireless Communication (MLPKG)

A Sarkar, JK Mandal - arXiv preprint arXiv:1208.2334, 2012 - arxiv.org
In this paper, a multilayer perceptron guided key generation for encryption/decryption
(MLPKG) has been proposed through recursive replacement using mutated character code …

[PDF][PDF] Secured transmission through multi layer perceptron in wireless communication (STMLP)

A Sarkar, JK Mandal - Int. J. Mob. Netw. Commun. Telemat.(IJMNCT), 2014 - academia.edu
In this paper, a multilayer perceptron guided encryption/decryption (STMLP) in wireless
communication has been proposed for exchange of data/information. Multilayer perceptron …