AVN Krishna, BA Vinaya - Computer Sciences and Telecommunications, 2007 - elibrary.ru
One of the recent developments in telecommunication industry is the introduction of communications through Internet. The advantage of this approach is its application in …
In this work a model is going to be used which develops data distributed over a identified value which is used as nonce (IV). By properly considering an empirical value, data is …
In this work a model is going to be used which develops data distributed over a identified value which is used as nonce (IV). The model considers an equilibrium equation which is a …
In this work the probabilistic encryption algorithm is presented. Essentially a cryptosystem that is probabilistic secured means that it may be possible to modify a cipher text into …
AVN Krishna, PVS Chand - BVICAM's International Journal of Information …, 2011 - bvicam.in
In this work the encryption mechanism in MANET & WSN is considered. One of the very important parameters with MANET & WSN is its low computing power availability in its real …
In the current scenario of the world, the technologies have advanced so much that most of the people prefer working with the internet as the main medium to transfer data or messages …
In this paper, we propose a modification probabilistic encryption algorithm by generating Basins (sub keys) dynamically. A probabilistic encryption produces more than one cipher …
Heterocyclic chemistry is a profile source for a large number of unusual, structurally complex and bioactive molecules. Over the decades, the compounds emerged from this field hold …
In this work a non linear model is going to be used which develops data distributed over an identified value which is used as nonce (IV). The key to be considered in the model is a …