Notice Board :

Call for Paper
Vol. 11 Issue 6

Submission Start Date:
June 01, 2019

Acceptence Notification Start:
June 10, 2019

Submission End:
June 20, 2019

Final MenuScript Due:
June 22, 2019

Publication Date:
June 25, 2019
                         Notice Board: Call for PaperVol. 11 Issue 6      Submission Start Date: June 01, 2019      Acceptence Notification Start: June 10, 2019      Submission End: June 20, 2019      Final MenuScript Due: June 22, 2019      Publication Date: June 25, 2019




Volume X Issue I

Author Name
S Gupta
Year Of Publication
2018
Volume and Issue
Volume 10 Issue 1
Abstract
Sometimes the knowledge that is transferred during the communication in between device node is very much confidential that is required to be secure. Since device nodes are resource unnatural and run on battery, power consumption ought to be low to form it operate for several days. For securing the knowledge varied trigonal key encryption algorithms like RC4, DES, BLOWFISH etc., are used. Our aim during this paper is to use security in device network in such the simplest way that it give confidentiality with authentication victimization Stream cipher modes of operation, so that the energy consumption can minimizes at the device node and the life time of device node can increase.
PaperID
2018/EUSRM/1/2018/44603

Author Name
A R Ghosh, S Ramalingam
Year Of Publication
2018
Volume and Issue
Volume 10 Issue 1
Abstract
A security of a picture secret writing theme supported improved chaotic cat maps was analyzed. In these analyses, it have revealed some rules of key info leaky in bound instances, and has distinguished that the algorithmic rule is insensitive to both the management parameters and also the changes of plaintext. In the condition of known-image attack, a similar key-solved algorithm concerning once iteration and a lot of iteration are projected respectively. Simulation experiments show that the equivalent decryption image is obtained by victimization the higher than key-solved algorithms, and thus the first algorithmic rule is insecure within the known image attack.
PaperID
2018/EUSRM/1/2018/44678