International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064

Found about 379 results

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena [3] | A. Komathi [2]

Share this Article

Downloads: 301 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Information Technology, India, Volume 8 Issue 1, January 2019

456 - 460

Analysis of Blockchain and its Working Principle

S. Banupriya | G. Renuka Devi

Share this Article

Downloads: 227 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Research Paper, Information Technology, India, Volume 8 Issue 3, March 2019

514 - 520

Secure Conversation and Images Using End-to-End Encryption on Android in WhatsApp

Amritha R [2] | Anu Priya R | Initha G [2] | Sindhu Priya S

Share this Article

Downloads: 215 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Informative Article, Computer Science & Engineering, India, Volume 9 Issue 3, March 2020

631 - 634

End-End Authentication and Cryptography based on Mobile Number and Mac Address

S Shunmuga Sundaram

Share this Article

Downloads: 200

Research Paper, Computer Science, Iraq, Volume 9 Issue 3, March 2020

286 - 291

DNA-Chaos S-Box Generation for Modified Lightweight AES Algorithm for Data Packet Protection in MANET

Muntaha A. Hatem | Haider K. Hoomod [6]

Share this Article

Downloads: 197

Survey Paper, Information Technology, India, Volume 6 Issue 1, January 2017

711 - 724

A Survey on Advanced Encryption Standard

Sandeep Kumar Rao | Dindayal Mahto | Dr. Danish Ali Khan

Share this Article

Downloads: 195 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 9 Issue 1, January 2020

524 - 527

A Review Paper on Network Security and Cryptography

Preeti Dewangan

Share this Article

Downloads: 194

Research Paper, Computer Science & Engineering, India, Volume 8 Issue 2, February 2019

50 - 52

Comparison of MAC and Digital Signature

G. Pranitha [3]

Share this Article

Downloads: 191 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, Russia, Volume 1 Issue 1, October 2012

5 - 9

Cryptographic System in Polynomial Residue Classes for Channels with Noise and Simulating Attacker

O. Finko [2] | D. Samoylenko

Share this Article

Downloads: 181 | Monthly Hits: ⮙2

Informative Article, Computer Science & Engineering, India, Volume 6 Issue 5, May 2017

341 - 343

Block Chain for Securing Internet of Things

Astha Kumari | Sayed Sohail | Ritwik Giri

Share this Article

Downloads: 180

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020

12 - 16

Secure e-Commerce Transactions using ElGamal Elliptic Curve Cryptosystem

Srishti Sharma

Share this Article

Downloads: 177

Research Paper, Computer Science & Engineering, India, Volume 8 Issue 7, July 2019

468 - 476

Prominent Security of the Quantum Key Distribution Protocol

Mohit Shukla | Sarvesh Patel

Share this Article

Downloads: 172 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 8 Issue 12, December 2019

402 - 405

Implementation of DES Algorithm in Python

Sakshi Agarwal [3] | P K Bharti | Rajesh Kumar Pathak

Share this Article

Downloads: 170 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Information Technology, India, Volume 8 Issue 8, August 2019

703 - 705

Bitcoin and its Real Time Applications

Rishika Malli

Share this Article

Downloads: 169 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016

65 - 69

Prevention of Phishing Threats using Visual Cryptography and One Time Password (OTP)

Sneha M. Shelke | Prachi A. Joshi [2]

Share this Article

Downloads: 168

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 5, May 2020

475 - 488

Image Steganography Based on Improved LSB Embedding and AES Cryptography

Abhishek Singh [7]

Share this Article

Downloads: 162 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

190 - 197

Cyber Security for Remote Patient Monitoring System

B. Manjulatha

Share this Article

Downloads: 159

Informative Article, Management, India, Volume 8 Issue 1, January 2019

606 - 608

Blockchain Technology has the Ability to Change the Face of New Business

Dr. Ravikumar [3] | Omprathap Velu

Share this Article

Downloads: 158 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, Russia, Volume 1 Issue 1, November 2012

20 - 22

Parallel Generators of Pseudo-random Numbers with Control of Calculation Errors

S. Dichenko | O. Finko [2]

Share this Article

Downloads: 158

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 2, February 2018

1000 - 1004

Cloud Data Auditing Techniques with a Focus on Privacy and Security

Vardireddy Harish Kumar Reddy | K. Sashi Rekha

Share this Article
Top