Nur algorithm on data encryption and decryption
暂无分享,去创建一个
Andino Maseleno | Muhamad Muslihudin | S. Hemalatha | Fauzi | Nur Aminudin | Kartik Shankar | Rita Irviani | K. Sathesh Kumar
[1] G. Murugaboopathi,et al. Analysis and assessment of various cryptographic techniques based on a variety of features , 2018 .
[2] A NeebaE,et al. Secured cryptographic data model for cloud , 2018 .
[3] Kartik Shankar,et al. Optimal key based homomorphic encryption for color image security aid of ant lion optimization algorithm , 2018 .
[4] K. Shankar,et al. RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography , 2017, China Communications.
[5] B KirubanandV.,et al. A lightweight hybrid encryption technique to secure IoT data transmission , 2018 .
[6] Fazal Noorbasha,et al. FPGA implementation of RGB image encryption and decryption using DNA cryptography , 2018 .
[7] D Manivannan,et al. An efficient cryptographic scheme for text message protection , 2018 .
[8] Abhishek Bhardwaj,et al. HS1-RIV: Improved Efficiency for Authenticated Encryption , 2018 .
[9] R H Aswathy,et al. An investigation on cryptographic algorithms usage in IoT contexts , 2018 .
[10] Joseph Varghese Kureethara,et al. Anefficient 2-Step DNA symmetric cryptography algorithm based on dynamic data structures , 2018 .
[11] Sachin Kumar,et al. Study & analysis of cryptography algorithms : RSA, AES, DES, T-DES, blowfish , 2017 .
[12] R. Vasantha,et al. An identity encryption cloud scheme based on SMTP using advanced blow fish algorithm , 2017 .
[13] N Srinivasu,et al. Security enhanced using honey encryption for private data sharing in cloud , 2017 .
[14] Gaurav Sharma,et al. Enhancing security for end users in cloud computing environment using hybrid encryption technique , 2018 .
[15] V. B. Kirubanand,et al. Data encryption in public cloud using multi-phase encryption model , 2018 .
[16] A. Murali,et al. VLSI design for efficient RSD-Based ECC processor using Karatsuba algorithm , 2017 .
[17] V Srikanth,et al. A Study on Light Weight Cryptography Algorithms for Data Security in IOT , 2018 .
[18] B. Murali Krishna,et al. Reconfigurable pseudo biotic key encryption mechanism for cryptography applications , 2017 .
[19] Mohith Lalita Kumar Parvataneni,et al. Secure and Efficient Query Processing Using Randomized Encryption and De-duplication on the Cloud , 2018 .
[20] B. Amutha,et al. Encryption analysis of AES-Cipher Block Chaining performance in Crypto-Wall Ransomware and SDN based mitigation , 2018 .
[21] P. R. Devale,et al. A study on searchable encryption schemes , 2018 .
[22] P Anandan,et al. A Computational Approach of Highly Secure Hash Algorithm for Color Image Steganography Using Edge Detection and Honey Encryption Algorithm , 2018 .
[23] R Santhosh Kumar,et al. Neighbordiscovery-based security enhancement using threshold cryptography for IP address assigning in network , 2017 .
[24] P. Manimegalai,et al. Content arrangement characteristic based encryption in cloud using public auditing for data management , 2017 .
[25] Naresh Vurukonda,et al. A secure attribute-Based encryption scheme in cloud computing , 2018 .
[26] Joy Paulose,et al. Multi-key Modified Tiny Encryption Algorithm for HealthCare , 2018 .
[27] K Latha. Enforcing security in cloud environment using elliptic curve cryptography and third party auditing , 2018 .