Notice Board :

Call for Paper
Vol. 10 Issue 8

Submission Start Date:
Aug 01, 2018

Acceptence Notification Start:
Aug 10, 2018

Submission End:
Aug 15, 2018

Final MenuScript Due:
Aug 25, 2018

Publication Date:
Aug 30, 2018
                         Notice Board: Call for PaperVol. 10 Issue 8      Submission Start Date: Aug 01, 2018      Acceptence Notification Start: Aug 10, 2018      Submission End: Aug 15, 2018      Final MenuScript Due: Aug 25, 2018      Publication Date: Aug 30, 2018




Volume X Issue I

Author Name
S Gupta
Year Of Publication
2018
Volume and Issue
Volume 10 Issue 1
Abstract
Sometimes the knowledge that is transferred during the communication in between device node is very much confidential that is required to be secure. Since device nodes are resource unnatural and run on battery, power consumption ought to be low to form it operate for several days. For securing the knowledge varied trigonal key encryption algorithms like RC4, DES, BLOWFISH etc., are used. Our aim during this paper is to use security in device network in such the simplest way that it give confidentiality with authentication victimization Stream cipher modes of operation, so that the energy consumption can minimizes at the device node and the life time of device node can increase.
PaperID
2018/EUSRM/1/2018/44603

Author Name
A R Ghosh, S Ramalingam
Year Of Publication
2018
Volume and Issue
Volume 10 Issue 1
Abstract
A security of a picture secret writing theme supported improved chaotic cat maps was analyzed. In these analyses, it have revealed some rules of key info leaky in bound instances, and has distinguished that the algorithmic rule is insensitive to both the management parameters and also the changes of plaintext. In the condition of known-image attack, a similar key-solved algorithm concerning once iteration and a lot of iteration are projected respectively. Simulation experiments show that the equivalent decryption image is obtained by victimization the higher than key-solved algorithms, and thus the first algorithmic rule is insecure within the known image attack.
PaperID
2018/EUSRM/1/2018/44678