Image encryption using RSA algorithm

A Sahoo, P Mohanty, PC Sethi - Intelligent Systems: Proceedings of ICMIB …, 2022 - Springer
In the current covid pandemic situation, secure online transmission of data has the highest
precedence over other activities. For providing computational hardness that is for making …

Application of information communication network security management and control based on big data technology

M Du - International Journal of Communication Systems, 2022 - Wiley Online Library
With the continuous development of communication technology and computer network
technology and the continuous progress of social economy, information technology has …

Analysis of elliptic curve cryptography & RSA

MR Khan, K Upreti, MI Alam, H Khan… - Journal of ICT …, 2023 - ieeexplore.ieee.org
In today's digital world, the Internet is an essential component of communication networks. It
provides a platform for quickly exchanging information among communicating parties. There …

Group security using ECC

PC Sethi, N Sahu, PK Behera - International Journal of Information …, 2022 - Springer
Nowadays security is main issue during transmission of data. Among many cryptographic
methods, ECC is the public key asymmetric cryptosystem which provides faster computation …

Medical image encryption using enhanced Rivest Shamir adleman algorithm

YV Lakshmi, K Naveena, M Ramya… - … and Smart Energy …, 2023 - ieeexplore.ieee.org
Medical photographs are considered sensitive and crucial data in medical informatics
systems. To communicate medical photos via an insecure network, a trustworthy encryption …

Effective online teaching learning during COVID-19 pandemic

PC Sethi, PK Behera - Journal of Physics: Conference Series, 2021 - iopscience.iop.org
The COVID-19 pandemic has resulted in a dramatic change in our day to day life. It affected
not only the normal working of many organizations but also the traditional classroom …

Implementasi Metode Queue Tree Untuk Manajemen Bandwidth Berbasis Hotspot (Studi Kasus: Onesnet Bekasi)

R Rasim, M Mugiarso, J Warta - JSI (Jurnal …, 2022 - journal.universitassuryadarma.ac.id
Abstrak Penerapan Manajemen Bandwidth sudah saatnya dilakukan pada jaringan internet
yang mengalami perkembangan jumlah user dan bandwidth yang dibutuhkan. Penelitian ini …

[HTML][HTML] Anomaly detection and optimization using scalable and flexible network data characterization

PC Sethi, PK Behera - Global Transitions Proceedings, 2021 - Elsevier
In the context of information security, cyber-attacks such as malware attacksviruses, etc.
caused substantial damage to many organizations. The most common solution to cyber …

Content Management or Censorship?

G Gosztonyi - Censorship from Plato to Social Media: The Complexity …, 2023 - Springer
It is now becoming increasingly clear what new challenges even democratic states face in
relation to this new medium. If we follow Jack M. Balkin's above line of thought, we can say …

Dynamic Network Traffic Management for Secure and Faster Data Transmission

PC Sethi, PK Behera - Proceedings of the International Conference on …, 2022 - Springer
The evolution of a large number of network-related emerging technologies leads to the
exponential growth in the number of users. Traditional to corporate activities are being done …