Neural Networks and Rules-based Systems used to Find Rational and Scientific Correlations between being Here and Now with Afterlife Conditions
Neural Networks and Rules-based Systems used to Find Rational and
To: Author
Article Fingerprint
ReserarchID
CSTNWS6D0IZ
Dr. Raju Singh Kushwaha
In this fast developing world, the interchange of information is playing a key role. Everything needs information and processes them. This interchange of information needs an authentication, confidentiality and integrity. The security of information is provided many algorithms. There are vast numbers of algorithms for symmetry key cipher. All these algorithms have used either complicated keys to encrypt the plain text to cipher text or a complicated algorithms used for it. The level of security of algorithms is dependent on either number of iterations or length of keys. A comparative study have been made with RSA, DES, IDEA, BAM and other algorithms with frequency distribution, bit ratio to check the security level of proposed algorithm. Finally, a comparison has been made for time complexity for encryption of plain text and decryption from cipher text with above existing algorithms.
Dr. Raju Singh Kushwaha. 2012. \u201cEnhancement of Confidentiality of Data Transmitted over Covert Channel Using Grid Cipher Scheme\u201d. Global Journal of Computer Science and Technology - E: Network, Web & Security GJCST-E Volume 12 (GJCST Volume 12 Issue E10): .
Crossref Journal DOI 10.17406/gjcst
Print ISSN 0975-4350
e-ISSN 0975-4172
The methods for personal identification and authentication are no exception.
Total Score: 106
Country: India
Subject: Global Journal of Computer Science and Technology - E: Network, Web & Security
Authors: Dr. Raju Singh Kushwaha (PhD/Dr. count: 1)
View Count (all-time): 230
Total Views (Real + Logic): 10034
Total Downloads (simulated): 2708
Publish Date: 2012 06, Sat
Monthly Totals (Real + Logic):
Neural Networks and Rules-based Systems used to Find Rational and
A Comparative Study of the Effeect of Promotion on Employee
The Problem Managing Bicycling Mobility in Latin American Cities: Ciclovias
Impact of Capillarity-Induced Rising Damp on the Energy Performance of
In this fast developing world, the interchange of information is playing a key role. Everything needs information and processes them. This interchange of information needs an authentication, confidentiality and integrity. The security of information is provided many algorithms. There are vast numbers of algorithms for symmetry key cipher. All these algorithms have used either complicated keys to encrypt the plain text to cipher text or a complicated algorithms used for it. The level of security of algorithms is dependent on either number of iterations or length of keys. A comparative study have been made with RSA, DES, IDEA, BAM and other algorithms with frequency distribution, bit ratio to check the security level of proposed algorithm. Finally, a comparison has been made for time complexity for encryption of plain text and decryption from cipher text with above existing algorithms.
We are currently updating this article page for a better experience.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.