Embedding a Non-Standard Encryption/Decryption Method with Mathematical Draw Function to Meet Challenges in Mobility
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 9, Issue 5
Abstract
Our innovation and personal information are passes through air in wireless network and their secrecy can be preserved by using any one of the encryption method. Nowadays mobile plays a vital role in passing messages and pictures. New operating systems and functions were introduced in order to handle mobile operations due to restrictions on mobile like storage capacity, size of mobile, availability of tower, etc… This article explains the concepts of standard encryption and decryption methods, how the non-standard encryption/decryption methods used effectively to maintain secrecy, how to convert mathematical symbol into secret form in a quick manner, appearance of converted encrypted form of mathematical figures and embedding conversion and draw function by considering restriction on mobility.
Authors and Affiliations
S . Lakshmi Priya
Secure and Faster NN Queries on Outsourced Metric Data Assets
Cloud computing enables outsourcing of data in pay per use fashion. This will help data owners to have services of storage without the need for investment. However, they have security concerns as the cloud service provid...
Adaptive Integration of P2P and Mobile-Ad-hoc-Networks by a Cross Modeled CHORD Protocol
We set DHT (Distributed Hash Table) centered P2P (Peer to Peer) program-Chord in to MANET (Mobile Ad-hoc Network) in this paper. Then, we propose a new routing modified scheme Cross Modeled Chord(CM-Chord) which bases on...
Enhancing Rural Development in Tamilnadu through ICT: An Evaluation of Latest Technologies in the scheme MGNREGS
When e-governance indicates better governance, naturally, rural development becomes an essential part of it. It is so because developing countries like India depend on the villages and their welfare. Keeping this in mind...
Affective Embedded Systems: a Requirement Engineering Approach
This paper proposes an embedded system development process able to deal with affectivity requirements. This process includes W3C tools, such as EmotionML and SysML, in order to specify cognition and affectivity as system...
Multiple Criteria Decision Making Methodology for Network security
Technology and it’s requirement comes in various ways, considering one of the aspect as the building tool to next level journey of security as Information Security, i.e. how it plays the role in making and controlling th...