International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 144

Research Paper | Computer Science & Engineering | India | Volume 8 Issue 2, February 2019


Implementation of QKD-VTCPABE Security Model for Treasury Information System-E-Governance

Dr. Ramineni Sivarama Prasad, Gurram Veera Raghavaiah


Abstract: Security is one of the most important issues in E-governance projects. E-governance applications will be increasingly used by the citizens of many countries to access a set of government services. Currently, the use of the E-government applications arises many challenges, one of these challenges is the security issues. E-government applications security is a very important characteristic that should be taken into account. This paper analyses about new secured model developed for Treasury Information System by using Quantum Key Distribution based verifiable and traceable cipher text policy attributes based encryption (QKD-VTCP ABE) algorithm that support an integrated internet-based E-governance applications.


Keywords: e-Governance, Security Model, QKD-VTCP ABE, SWOT Tool, NLT, Preprocessing, Key Generation, Encryption, Decryption


Edition: Volume 8 Issue 2, February 2019,


Pages: 755 - 759


How to Cite this Article?

Dr. Ramineni Sivarama Prasad, Gurram Veera Raghavaiah, "Implementation of QKD-VTCPABE Security Model for Treasury Information System-E-Governance", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=ART20195154, Volume 8 Issue 2, February 2019, 755 - 759

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Security Model'

Downloads: 103

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 3, March 2016

Pages: 1885 - 1890

A Proposed Paper for D-Scrabble Physical Layer Security Model Integrated with AI

Devansh Dave

Share this Article

Downloads: 105

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2258 - 2261

A Survey on k-NN Classification over Semantically Secure Encrypted Relational

Mayadevi Kotlapure

Share this Article

Similar Articles with Keyword 'Preprocessing'

Downloads: 102

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1165 - 1168

Privacy Preserving Closed Frequent Pattern Mining

Anju Vijayan

Share this Article

Downloads: 102

Research Paper, Computer Science & Engineering, Kenya, Volume 5 Issue 8, August 2016

Pages: 1210 - 1214

Towards Effective Data Preprocessing for Classification Using WEKA

Kariuki Paul Wahome, Wekesa Bongo, Dr. Rimiru Richard Maina

Share this Article

Similar Articles with Keyword 'Key Generation'

Downloads: 101

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1525 - 1529

Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image

Maulik P. Chaudhari, Neha Parmar

Share this Article

Downloads: 104

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 598 - 602

Dynamic Key Generation Algorithm for User Authentication at Mobile Cloud Enviroinment

Deepak G, Dr. Pradeep. B. S, Shreyas Srinath

Share this Article

Similar Articles with Keyword 'Encryption'

Downloads: 115 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Similar Articles with Keyword 'Decryption'

Downloads: 115 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article
Top