An Efficient And Secure Cryptography Techniques Usingunimodular Matrix
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 1
Abstract
Abstract: In day to day life, transmission of data from sender to receiver with security is very difficult. "Cryptography" is one of the famous techniques which provide security for confidential data. Cryptography is one of the best techniques for the secure data transmission. Confidentiality of data, access control and nonrepudiation are the main goals of cryptography. The existing system is having limitations related to decrypts of Armstrong numbers. But the algorithm used in the proposed method uses unimodular matrix for encryption. Therefore, access control, non-repudiation and confidentiality of data is maintained.
Authors and Affiliations
ApurvaK. Vangujar , Kajal Agrawal
Artificial Neural Network For Recognition Of HandwrittenDevanagari Character
Abstract: Information gathering is one of the most important thing in the digital world, manyorganizationsstill use handwritten documents for storing their information. So it is important task to convert this infor...
A Review Paper on Cross Platform Mobile ApplicationDevelopment IDE
Abstract: Cross Platform Mobile Application Development is the development of mobile based applications sothat the development of these types of applications can be made platform-independent. A review has been made...
Scalable parallel clustering using modified Firefly algorithm
Abstract: Clustering is the process of assigning data objects into a set of disjoint groups called clusters so that objects in each cluster are more similar to each other than objects from different clusters. We tr...
Evaluation on a Simulated Annealing based Model for Solving Job Shop Scheduling Problem
The stochastic optimization techniques were commonly used in solving several optimization problems. There are different types of these algorithms that were addressed in several previous works. In our previous w...
Steps to System Reconfiguration in a Distributed DatabaseSystem: A Fault-tolerant Approach
Abstract: In this paper, we examine steps to system reconfiguration in a Distributed Database using some faulttolerance scheme for a distributed database system that is compatible with respect to system failure i.e...