Notice Board :

Call for Paper
Vol. 15 Issue 9

Submission Start Date:
Sep 01, 2023

Acceptence Notification Start:
Sep 10, 2023

Submission End:
Sep 25, 2023

Final MenuScript Due:
Sep 30, 2023

Publication Date:
Sep 30, 2023
                         Notice Board: Call for PaperVol. 15 Issue 9      Submission Start Date: Sep 01, 2023      Acceptence Notification Start: Sep 10, 2023      Submission End: Sep 25, 2023      Final MenuScript Due: Sep 30, 2023      Publication Date: Sep 30, 2023




Volume X Issue I

Author Name
S Gupta
Year Of Publication
2018
Volume and Issue
Volume 10 Issue 1
Abstract
Sometimes the knowledge that is transferred during the communication in between device node is very much confidential that is required to be secure. Since device nodes are resource unnatural and run on battery, power consumption ought to be low to form it operate for several days. For securing the knowledge varied trigonal key encryption algorithms like RC4, DES, BLOWFISH etc., are used. Our aim during this paper is to use security in device network in such the simplest way that it give confidentiality with authentication victimization Stream cipher modes of operation, so that the energy consumption can minimizes at the device node and the life time of device node can increase.
PaperID
2018/EUSRM/1/2018/44603

Author Name
A R Ghosh, S Ramalingam
Year Of Publication
2018
Volume and Issue
Volume 10 Issue 1
Abstract
A security of a picture secret writing theme supported improved chaotic cat maps was analyzed. In these analyses, it have revealed some rules of key info leaky in bound instances, and has distinguished that the algorithmic rule is insensitive to both the management parameters and also the changes of plaintext. In the condition of known-image attack, a similar key-solved algorithm concerning once iteration and a lot of iteration are projected respectively. Simulation experiments show that the equivalent decryption image is obtained by victimization the higher than key-solved algorithms, and thus the first algorithmic rule is insecure within the known image attack.
PaperID
2018/EUSRM/1/2018/44678