Privacy protected modified double ratchet algorithm for secure chatbot application

M Shah, M Panchal - 2022 3rd International Conference on …, 2022 - ieeexplore.ieee.org
Our world has been revolutionized as a result of digitalization. Large amounts of data are
regularly generated as a result of the well-known World Wide Web, various social …

Comparative study of can-bus and flexray protocols for in-vehicle communication

A Hafeez, H Malik, O Avatefipour, PR Rongali, S Zehra - 2017 - sae.org
Technological advances in automotive industry have resulted in an increased number of
Electronic Control Units (ECU) s. These ECUs are used for sensing and controlling actuators …

[PDF][PDF] Comparison of encryption algorithms for multimedia

MM Ahamad, MI Abdullah - Rajshahi University Journal of Science …, 2016 - academia.edu
Cryptographic techniques play crucial role when users exchange information. Multimedia
plays an important role in learning and sharing experiences. When multimedia contents are …

Performance Analysis of Various Encryption Algorithms for Securing Modules of Educational Chatbot

M Shah, A Vasant, P Patel, M Joshi, M Chauhan… - … Conference on Inventive …, 2024 - Springer
Artificial intelligence (AI)–based chatbots have become increasingly popular as technology
advances and businesses seek to provide more efficient and personalized customer service …

[PDF][PDF] Comparative analysis of symmetric cryptographic algorithms on. net platform

B Nithya, S Priya - Indian Journal of Science and …, 2016 - sciresol.s3.us-east-2.amazonaws …
Objectives: To find which cryptographic algorithm would produce fine result. Methods: This
survey mainly focuses to an analysis of symmetric cryptographic algorithms DES, 3DES …

Performance Analysis of Various Encryption Algorithms for Securing

M Shah, A Vasant, P Patel, M Joshi… - … Proceedings of ICICCT … - books.google.com
Artificial intelligence (AI)-based chatbots have become increasingly popular as technology
advances and businesses seek to provide more efficient and personalized customer service …

Analyzing The Best Key Encryption Algorithm

A Ahmed - International Research Journal of Advances in …, 2023 - irjacs.com
With technology now firmly established and this being the decade of tech professionalism,
data security stands out as a paramount concern. In an era where data is just a click away …

[PDF][PDF] International Journal of Engineering and Applied Computer Science

MN Attique Ahmed - 2022 - researchgate.net
The software development process is completely based on the requirements of
stakeholders. If the requirements of stakeholders are being integrated into the proposed …

Agent command manipulation system using two keys encryption model

S Sohana, RBM Mukta - 2016 5th International Conference on …, 2016 - ieeexplore.ieee.org
Cryptography plays a vital role in information security system against malicious attacks. This
security system uses some algorithms to scramble data into scribbled text which can only be …