• No results found

[PDF] Top 20 An Encryption Algorithm for Secure Data Transmission

Has 10000 "An Encryption Algorithm for Secure Data Transmission" found on our website. Below are the top 20 most common "An Encryption Algorithm for Secure Data Transmission".

An Encryption Algorithm for Secure Data Transmission

An Encryption Algorithm for Secure Data Transmission

... of data is of prime importance in today’s ...other algorithm. Thus, it is very important that the algorithm used for encryption of data is resistant to ...the algorithm uses ... See full document

5

An Encryption Algorithm for End to End Secure Data Transmission in MANET

An Encryption Algorithm for End to End Secure Data Transmission in MANET

... confidential data is transmitted over wireless network. Numerous encryption algorithms like AES, DES, RC4 and others are available for the ...accepted algorithm is AES algorithm. We have ... See full document

5

Secure Random Bit Size Encryption Algorithm For Wireless Sensor Data Transmission

Secure Random Bit Size Encryption Algorithm For Wireless Sensor Data Transmission

... of secure encrypted communication between two parties required that they first exchange keys by some secure physical ...wireless data transmission using Electronic Code Book Public Key ... See full document

10

Secure Data Transmission using Blowfish Algorithm

Secure Data Transmission using Blowfish Algorithm

... The presented simulation results showed that Blowfish has a better performance than other common encryption algorithms used. Since Blowfish has not any known security weak points so far, which makes it an ... See full document

7

Secure Data Transmission

Secure Data Transmission

... the transmission passage against all sort of attacks and transmit our information safely to the ...any encryption algorithm but in the wake of increasing attacks on data we will be ... See full document

6

A Multi-connection Encryption Algorithm Applied in Secure Channel Service System

A Multi-connection Encryption Algorithm Applied in Secure Channel Service System

... Internet, secure data transmission become more and more ...RSA encryption algorithm to improve the security, integrity and availability of ...level encryption and decryption ... See full document

10

Time Execution Constraints using Intricate Encryption and Decryption Process for Secure Data Transmission

Time Execution Constraints using Intricate Encryption and Decryption Process for Secure Data Transmission

... cryptography algorithm which is based on block cipher ...decrypting data which maintains the security on the communication channels by making it difficult for attacker to predicate a pattern as well as ... See full document

5

Secure Data Transmission Scheme by Using Encryption Based Technique: A Review

Secure Data Transmission Scheme by Using Encryption Based Technique: A Review

... of data transmitted through internet has put a number of ...to data transmission such as confidentiality, data security and data loss are becoming serious ...are encryption and ... See full document

5

Cryptosystem for Secure Data Transmission using Advance Encryption Standard (AES) and Steganography

Cryptosystem for Secure Data Transmission using Advance Encryption Standard (AES) and Steganography

... of data transfer over the internet globally has increased and this called for more data security as security of data is of great concern for individuals as well as business ...for data ... See full document

6

Providing confidentiality, data integrity 
		and authentication of transmitted information

Providing confidentiality, data integrity and authentication of transmitted information

... map encryption algorithm was combined with watermarking algorithm to implement a secure image system [15], the implemented approach satisfied the confidentiality and authentication security ... See full document

8

DRINA: A SECURE CLUSTERING ALGORITHM

DRINA: A SECURE CLUSTERING ALGORITHM

... for data transmission. There is a need for secure transmission of information, as the information provided by networks has been ...paper Secure DRINA algorithm is ...DRINA ... See full document

8

An Efficient Model for Secure Data Publishing

An Efficient Model for Secure Data Publishing

... An algorithm was designed based on the proposed model. A tool has also been developed to implement the algorithm. The tool is named as ComEncColor (CEC). CEC is developed in JAVA which can encrypt ... See full document

5

Implementation of Secure Data Transmission Scheme by Using Encryption Based Technique

Implementation of Secure Data Transmission Scheme by Using Encryption Based Technique

... bandwidth transmission speed. However, reliability issues regarding to data transmission such as confidentiality, data security and data loss are becoming serious ...transmitted ... See full document

9

Secure Image Transmission And Evaluation Of Image Encryption

Secure Image Transmission And Evaluation Of Image Encryption

... technique encryption and decryption process resembles to that of AES, in account of number of rounds, data and key ...image encryption which can overcome the problem of textured zones existing in ... See full document

5

ADVANCED SECURE METHOD FOR DATA TRANSMISSION IN MANET USING RSA ALGORITHM

ADVANCED SECURE METHOD FOR DATA TRANSMISSION IN MANET USING RSA ALGORITHM

... lightweight encryption protocol that fulfills the need for security protection in wireless ad-hoc ...sensitive data by dynamically changing the secret key for data encryption during packet ... See full document

10

Secure Transmission of Data through Electronic Devices using ECC Algorithm

Secure Transmission of Data through Electronic Devices using ECC Algorithm

... Computer data transfer plays a very important role in daily ...transfer data is to focus on finding answers for life problem by transfer information from one person to ...transfer data can range from ... See full document

6

Secure Energy Efficient Data Transmission over WSNs

Secure Energy Efficient Data Transmission over WSNs

... In this paper the system addresses an enhancement of low-energy adaptive clustering hierarchy (LEACH) protocol for wireless sensor networks that uses a distributed cluster formation based on affinity propagation (AP). ... See full document

5

Secure Data Transmission Using Hop-By-Hop Routing Algorithm S. P. Gayathri , K. Susmitha

Secure Data Transmission Using Hop-By-Hop Routing Algorithm S. P. Gayathri , K. Susmitha

... A set of links or nodes could be shared between many path and any failure occur could affect these paths, which might results in consuming user’s energy in sending packets without knowing the existence of any failure in ... See full document

6

Selective Bitplane Encryption For Secure Transmission Of Image Data In Mobile Environment

Selective Bitplane Encryption For Secure Transmission Of Image Data In Mobile Environment

... visual data is reasonable or possible ...the data reduction of lossless compression schemes is much lower as compared to lossy ones making the respective application less ...for encryption for almost ... See full document

5

A Secure Encryption approch for Texual Data Transmission

A Secure Encryption approch for Texual Data Transmission

... of data is ...documents. Data hidden in the web document is less suspicious in compare of other carriers because HTML WebPages are now a routine part of everyone‟s life and html document contains the ... See full document

6

Show all 10000 documents...