Found about 379 results
Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
991 - 995A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
Downloads: 301 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Information Technology, India, Volume 8 Issue 1, January 2019
456 - 460Analysis of Blockchain and its Working Principle
S. Banupriya | G. Renuka Devi
Downloads: 227 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2
Research Paper, Information Technology, India, Volume 8 Issue 3, March 2019
514 - 520Secure Conversation and Images Using End-to-End Encryption on Android in WhatsApp
Amritha R [2] | Anu Priya R | Initha G [2] | Sindhu Priya S
Downloads: 215 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Informative Article, Computer Science & Engineering, India, Volume 9 Issue 3, March 2020
631 - 634End-End Authentication and Cryptography based on Mobile Number and Mac Address
S Shunmuga Sundaram
Downloads: 200
Research Paper, Computer Science, Iraq, Volume 9 Issue 3, March 2020
286 - 291DNA-Chaos S-Box Generation for Modified Lightweight AES Algorithm for Data Packet Protection in MANET
Muntaha A. Hatem | Haider K. Hoomod [6]
Downloads: 197
Survey Paper, Information Technology, India, Volume 6 Issue 1, January 2017
711 - 724A Survey on Advanced Encryption Standard
Sandeep Kumar Rao | Dindayal Mahto | Dr. Danish Ali Khan
Downloads: 195 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Review Papers, Computer Science & Engineering, India, Volume 9 Issue 1, January 2020
524 - 527A Review Paper on Network Security and Cryptography
Preeti Dewangan
Downloads: 194
Research Paper, Computer Science & Engineering, India, Volume 8 Issue 2, February 2019
50 - 52Comparison of MAC and Digital Signature
Downloads: 191 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, Russia, Volume 1 Issue 1, October 2012
5 - 9Cryptographic System in Polynomial Residue Classes for Channels with Noise and Simulating Attacker
O. Finko [2] | D. Samoylenko
Downloads: 181 | Monthly Hits: ⮙2
Informative Article, Computer Science & Engineering, India, Volume 6 Issue 5, May 2017
341 - 343Block Chain for Securing Internet of Things
Astha Kumari | Sayed Sohail | Ritwik Giri
Downloads: 180
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020
12 - 16Secure e-Commerce Transactions using ElGamal Elliptic Curve Cryptosystem
Srishti Sharma
Downloads: 177
Research Paper, Computer Science & Engineering, India, Volume 8 Issue 7, July 2019
468 - 476Prominent Security of the Quantum Key Distribution Protocol
Mohit Shukla | Sarvesh Patel
Downloads: 172 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 8 Issue 12, December 2019
402 - 405Implementation of DES Algorithm in Python
Sakshi Agarwal [3] | P K Bharti | Rajesh Kumar Pathak
Downloads: 170 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Information Technology, India, Volume 8 Issue 8, August 2019
703 - 705Bitcoin and its Real Time Applications
Rishika Malli
Downloads: 169 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016
65 - 69Prevention of Phishing Threats using Visual Cryptography and One Time Password (OTP)
Sneha M. Shelke | Prachi A. Joshi [2]
Downloads: 168
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 5, May 2020
475 - 488Image Steganography Based on Improved LSB Embedding and AES Cryptography
Downloads: 162 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016
190 - 197Cyber Security for Remote Patient Monitoring System
B. Manjulatha
Downloads: 159
Informative Article, Management, India, Volume 8 Issue 1, January 2019
606 - 608Blockchain Technology has the Ability to Change the Face of New Business
Dr. Ravikumar [3] | Omprathap Velu
Downloads: 158 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, Russia, Volume 1 Issue 1, November 2012
20 - 22Parallel Generators of Pseudo-random Numbers with Control of Calculation Errors
S. Dichenko | O. Finko [2]
Downloads: 158
Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 2, February 2018
1000 - 1004Cloud Data Auditing Techniques with a Focus on Privacy and Security
Vardireddy Harish Kumar Reddy | K. Sashi Rekha