A Literature Review: Cryptography Algorithms for Wireless sensor networks
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2013, Vol 4, Issue 10
Abstract
Cryptography is that the observe and study of techniques for secure communication within the presence of third parties. It additionally plays important of wireless sensor networks. The cryptography drawback has addressed in several contexts and by researchers in several disciplines. This expositive paper presents survey of a number of the newest developments on cryptography algorithms in network security and additionally presents with a number of the solutions for wireless sensor network alongside the results.
Authors and Affiliations
L. Jothi
Secret Detection of Sensitive Data Leakage
Surveys from many years have shown that many data leakages has been found due different problems like malicious attacks, hacking, different attacks. Approximately 28% of all data leakages are due to human mistakes which...
Two Stage Robust Filtering Technique to Remove Salt & Pepper Noise in Grayscale Image
Digital images are playing a key role but while transmitting the image more disturbances are produced by the noise which corrupts the image. Denoising leads to good quality image and restoration of original information....
A Study on Reliable Data Delivery for Highly Dynamic MANETs
This paper addresses the problem of delivering data packets in highly dynamic Mobile Ad Hoc network. Existing routing protocols are susceptible to node mobility. To overcome this issue, an efficient Position based Routin...
Operating System Security : Security Policies
Security is the primary concern in the modern world. The main focus of this paper is the security of our information and its supporting infrastructure. By keeping the computer system secure we can provide the security to...
Security Scheme for Data Authentication Based on Elliptic Curve Cryptography
An encryption is providing authentication and security for illicit manipulation of digital data. In this paper the security scheme for authentication and secrecy of digital data through ElGamal public key cryptographic a...