[PDF][PDF] Combining several substitution cipher algorithms using circular queue data structure

N Ibraheem, M Hasan - Baghdad Science Journal, 2020 - iasj.net
With the revolutionized expansion of the Internet, worldwide information increases the
application of communication technology, and the rapid growth of significant data volume …

[PDF][PDF] Development of Advanced Encryption Standard (AES) Cryptography Algorithm for Wi-Fi Security Protocol

MA Alrammahi, H Kaur - International Journal of Advanced …, 2014 - researchgate.net
Today all organizations generally rely on wireless networks for ease of movement and less
expensive than wired networks but also wireless networks suffer from some of the …

Cloud computing security: attacks, threats, risk and solutions

S Kaushik, C Gandhi - International Journal of Networking …, 2018 - inderscienceonline.com
Cloud computing started a new promising era in the field of IT and provided a new direction
for the efficient use of resources, within the least amount. It becomes a centre of attraction for …

[PDF][PDF] Enriching AES through the key generation from Genetic Algorithm

P Bagane, S Kotrappa - Indian Journal of Computer Science and …, 2021 - ijcse.com
Data security and encryption is one of the most useful at highly essential aspects of enabling
effective security of the data against attacks and intrusions. This is an effective and useful …

Efficient handling of distributed data vending through blockchains

DB Adate, PM Shafi, HD Surjono… - Proceeding of First …, 2021 - Springer
Data is an essential requirement for a number of approaches that have a requirement for
large amounts of data such as PHR or public health records for medical institutions, relevant …

Managing Crowd Sourcing paradigm through Efficient blockchain technology

PB Suryakar, VV Bagade - ADBU Journal of Engineering …, 2020 - journals.dbuniversity.ac.in
Crowdsourcing paradigm has been getting increasingly popular in recent years. The
crowdsourcing platform allows for the integration of a large number of workers in achieving …

[PDF][PDF] Secure Brokerless System for Publisher/Subscriber Relationship in Distributed Network

RA Jairange, AK Gupta - academia.edu
Public subscribe systems are more attracted academic and industrial interest in last few
years, including certain experiences of development and deployment. The primary …

Inordinate Voice Based Examination System

SB Choudhary, SG Marne - 2017 International Conference on …, 2017 - ieeexplore.ieee.org
To abates the use of papers, to alleviate human efforts and to ameliorate examination
system we have ascertain this system. As traditional system has attenuated there was a …

[PDF][PDF] Year of Publication: 2016

SK Singhal - 2016 - academia.edu
In this present era of technology, organizational knowledge is the only source of long term
sustainable competitive advantage. This has attracted the interest of organizations towards …

[PDF][PDF] An Effective Approach for Key Exposure Resistance in Cloud using De Duplication and Tile Bitmap Method

S Singha, SD Satav - International Journal of Computer Applications, 2016 - academia.edu
Since a lot of data is dynamically updated and stored in today‟ s scenario, the previous
methods used for checking static data integrity can no longer be applied to analyze the …