Search

Your search keyword '"Key generation"' showing total 52 results

Search Constraints

Start Over You searched for: Descriptor "Key generation" Remove constraint Descriptor: "Key generation" Journal international journal of computer applications Remove constraint Journal: international journal of computer applications
52 results on '"Key generation"'

Search Results

2. Key Generation using Ternary Tree based Group Key Generation for Data Encryption and Classification

3. Pairwise Independent Key Generation Algorithm: A Survey

4. Fingerprint bio-Crypto key generation using Scale Invariant Feature Transform (SIFT)

5. Chaos Encryption Algorithm using Key Generation from Biometric Image

6. New Approaches to Encrypt and Decrypt Data in Image using Cryptography and Steganography Algorithm

7. Securing Modern Voice Communication Systems using Multilevel Chaotic Approach

8. Cryptographic Key Generation based on Contextual Information: A Review

9. Enhancing the Security of Caesar Cipher Substitution Method using a Randomized Approach for more Secure Communication

10. Design of ID-based Contributory Key Management Scheme using Elliptic Curve Points for Broadcast Encryption

11. LOKS: Low-Overhead Forward and Backward Key Secrecy in WSNs

12. Optimal Keyless Algorithm for Security

13. A Novel Cryptographic Key Distribution Scheme for Cloud Platforms

14. Hybrid Ciphering System of Images based on Fractional Fourier Transform and Two Chaotic Maps

15. A Secure License Key Generation using FBPS

16. A Study on Cryptography using Genetic Algorithm

17. Algorithm for Text Data Encryption by Position Swapping based on LFSR Pseudorandom Key Generation

18. Tree based Key Generation and Distribution Scheme in WSN

19. TTSM: Trust Threshold Security Model for User Assured Security in Cloud Computing

20. Generating the Best Fit Key in Cryptography using Genetic Algorithm

21. SAKGP: Secure Authentication Key Generation Protocol in WLAN

22. FPGA Implementation of 16 bit RSA Cryptosystem for Text Message

23. Trust based Leader Selection Methodology for P-LeaSel: A Multicast Group Communication Model

24. Survey on Secure Data Retrieval Techniques for Military Networks

25. A Pythagorean Tree based Key Generation Algorithm for Secure Group Communication in MANETs

26. New CA based Key Generation for a Robust RGB Color Image Encryption Scheme

27. RSA Public Key Cryptosystem using Modular Multiplication

28. A Novel Symmetric Key Cryptography using Multiple Random Secret Keys

29. Image Encryption using Key Matrix Generation and Lossless Compression

30. An Enhanced Symmetric Key Cryptography Algorithm to Improve Data Security

31. A Secure Mobile Banking Scheme based on Certificateless Cryptography in the Standard Security Model

32. Three Novel Theorems for Applied Cryptography

33. A Two Round Block Cipher Symmetric Key Cryptography based on Key Stream

34. Role of Biometric Cryptography in Cloud Computing

35. Enhancing Bluetooth Authentication using Diffie Hellman Algorithm

36. Frequency Speech Scrambler based on Hartley Transform and OFDM Algorithm

37. Distributed Hierarchical Group Key Management using Elliptic Curve and Hash Function

38. Hybridize Dynamic Symmetric Key Cryptography using LCG

39. Modified Block Playfair Cipher using Random Shift Key Generation

40. An Encryption Algorithm for End-to-End Secure Data Transmission in MANET

41. Analysis of a Modified RC4 Algorithm

42. Symmetric Key Cryptography using Dynamic Key and Linear Congruential Generator (LCG)

43. Reconfigurable Architecture for Network processing

44. An Efficient SKM Framework for Data Authentication and its Application to the Adhoc Networks

45. An Encryption Algorithm for Secure Data Transmission

46. A CRT based encryption methodology for secure communication in MANET

47. 'An Unassailable Block Cipher Generation with an Extended PCC, Concerning a Large Alphanumeric Kay, Modular Arithmetic and Integral Functions '

48. Random Photon Key Pasting (RPKP) for Secure Optical Data Transport in Quantum Key Distribution

49. A New Watermarking Approach for Non numeric Relational Database

50. A Password-Authenticated Key Agreement Scheme Based on ECC Using Smart Cards

Catalog

Books, media, physical & digital resources