Encryption techniques: A theoretical overview and future proposals

J Sanchez, R Correa, H Buenaño… - … on eDemocracy & …, 2016 - ieeexplore.ieee.org
The usage of encrypted messages has a long history. Today, however, we are able to
maintain the security and privacy of information, which is essential to current research in …

A matrix-based approach to reconstruction of 3D objects from three orthographic views

SX Liu, SM Hu, CL Tai, JG Sun - Proceedings the Eighth …, 2000 - ieeexplore.ieee.org
Presents a matrix-based technique for reconstructing solids with quadric surfaces from three
orthographic views. First, the relationship between a conic and its orthographic projections is …

SECURING CLOUD ENVIRONMENTS: A COMPARATIVE ANALYSIS OF RSA AND MRGA FOR ENHANCED DATA PROTECTION.

CV Josphine - I-Manager's Journal On Cloud Computing, 2023 - search.ebscohost.com
Cloud computing revolutionizes the way businesses are stored and managed, and ensures
robust security measures. This paper explores the use of Rivest-Shamir-Adleman (RSA) and …

[PDF][PDF] Journal Homepage:-www. journalijar. com

N Tyagi, A Agarwal, A Katiyar, S Garg, S Yadav - researchgate.net
Health is a state of complete physical, mental, and social well-being, rather than solely the
absence of disease (WHO).[1] Optimal quality of health is a basic right as well as an …

[PDF][PDF] INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY DESIGN A TECHNIQUE FOR CIPHER WITH REVERSE STRING-A …

R Mandhanya, P Singhal, S Verma - academia.edu
IJESRT Page 1 ISSN: 2277-9655 [Mandhanya* et al., 5(10): October, 2016] Impact Factor:
4.116 IC™ Value: 3.00 CODEN: IJESS7 http: // www.ijesrt.com © International Journal of …