Document Management System with Enhanced Security
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2012, Vol 1, Issue 2
Abstract
This paper provides the design of a Document Management System designed for a Small to Medium scale enterprises with a special emphasis on security, it also describes a new symmetric encryption algorithm Secured Quick Crypt and its unique block chaining mechanism. Along with this, various other small enhancements in terms of Compression, Abstraction and File Versioning have also been described in the paper.
Authors and Affiliations
M. K Kodmelwar
Computerized Power Montoring System for EEDC Umuahia
Abstract: The computerized process in any facet of human existence or any sector of any economy promotesefficiency accuracy, effectiveness, improved service delivery and many more. This is also applies to thecomput...
Pleurogenoides neelimae n. sp. (Trematoda: Pleurogenidae) from the intestine of a freshwater fish Wallago attu (Bloch)
Pleurogenoides neelimae n. sp. from a fresh water siluroid fish, Wallago attu (Bloch) is described. It is distinguished from other species in having an oral sucker more or less equal to the ventral sucker, genital pore i...
A Smart and Wearable Cardiac Healthcare System with Monitoring of Sudden Fall for Elderly and Post-Operative Patients
Abstract: The dominance of chronic diseases, driven by an increasingly aging population with a new health paradigm that emphasizes early finding, early diagnosis and early treatment, is highly recommended. Especially, Ca...
Empirical Study of 2-bit Fast Adder using Simon 2.0
Abstract : The present context of post CMOS era demands highly sophisticated low power consuming high speed novel integrated chips in nanometer region. SET (Single Electron Transistor) is eventually the highest priority...
A New Approach for Improving Performance of Intrusion Detection System over MANET
A Mobile Ad-hoc Network (MANET) is one of the busy and public networks; Because of this the network suffers from the problems of different kind of attacks. In such attacks some malicious nodes are present that fa...