AN APPROACH TO REVAMP THE DATA SECURITY USING CRYPTOGRAPHIC TECHNIQUES
Abstract
Keywords
Full Text:
PDFReferences
. SuyashVerma, RajnishChoubey, Roopalisoni “An Efficient Developed New Symmetric Key Cryptography Algorithm for Information Security” International Journal of Emerging Technology and Advanced Engineering Volume 2, Issue 7, July 2012.
. S. Castano, M. Fugini, G. Martella, and P. Samarati, Database Security, Addison-Wesley, 1995.
. Dr. L. Arockiam, S. Monikandan, “AROcrypt: A Confidentiality Technique for Securing Enterprise’s Data in Cloud”, International Journal of Engineering and Technology, ISSN: 0975-4024, Volume 7, Issue 1, February-March 2015, pp. 245-253.
. Wuling Ren, "A Hybrid Encryption Algorithm Based on DES and RSA in Bluetooth Communication”, Second International Conference on Modeling", Simulation and Visualization Methods (WMSVM), 2010.
. Grabbe J, Data Encryption Standard: The Triple DES algorithm illustrated Laissez faire city time, Volume: 2, No. 28, and 2003.
. Chih-Pin Su, Tsung-Fu Lin, Chih-Tsun Huang, and Cheng-Wen Wu, National Tsing Hua University,” A high throughput low cost AES processor” IEEE Communications Magazine 0163-6804/03 2003 IEEE.
. Nithin Nagaraj, “Short communication One-Time Pad as a nonlinear dynamical system” Amrita Vishwa Vidyapeetham, Amritapuri Campus, India, Elsevier
. Aman Kumar, Dr. Sudesh Jakhar and Mr. Sunil Makkar, "Comparative Analysis between DES and RSA Algorithm’s", International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 7, pp. 386-391, July 2012.
. Xin Zhou and Xiaofei Tang, "Research and Implementation of RSA Algorithm for Encryption and Decryption", the 6th International Forum on Strategic Technology, pp. 1118 – 1121, 2011.
. Simon Blake Wilson et al., “Key agreement protocols and their security analysis,” 9-sep- 1997.
. Erfaneh Noorouzil et al, “A New Digital Signature Algorithm”, International Conference on Machine Learning and Computing, IPCSIT vol.3, 2011.
. Robert Zuccherato, “Elliptic Curve Cryptography Support in Entrust,” Entrust ltd. in Canada, Dated: 9-may-2000.
. Othman O. Khalifa, “Communication Cryptography”, IEEE transaction on Cryptography, 2004, pp. 1-15.
. Meenakshi Shankar and Akshaya.P, International Journal of Network Security & Its Applications (IJNSA) Vol.6, No.6, November 2014. Hybrid Cryptographic Technique Using RSA Algorithm and Scheduling Concepts
DOI: https://doi.org/10.26483/ijarcs.v8i7.4284
Refbacks
- There are currently no refbacks.
Copyright (c) 2017 International Journal of Advanced Research in Computer Science

