Zobrazeno 1 - 10
of 19
pro vyhledávání: '"Atul Chaturvedi"'
Publikováno v:
Journal of Discrete Mathematical Sciences and Cryptography. 24:1241-1256
Hash functions are used for data integrity and authentication but unfortunately they suffer with man in the middle attack problem. An intruder who has command over the communication channel can sen...
Publikováno v:
Journal of Discrete Mathematical Sciences and Cryptography. 24:1189-1204
Publikováno v:
Wireless Personal Communications. 118:185-193
Authentication is a term very important for data communication security. We see many frauds due to authentication failure. The problem manifolds when communication is over insecure channel. Entity authentication is a term which involves proof of send
Publikováno v:
Journal of Discrete Mathematical Sciences and Cryptography. 22:1393-1406
OTP (One Time Passwords) are very important in today’s scenario in various applications like in financial transactions, e-commerce etc. They are used for enhancing the security of data comm...
Publikováno v:
Journal of Discrete Mathematical Sciences and Cryptography. 22:1435-1451
We know that the importance, need and utility of EHR (Electronic Health Record) system is increasing rapidly in the modern world. The developed countries like USA, Canada has adopted this s...
Publikováno v:
Wireless Personal Communications. 110:861-872
Secure data communication is the need of hour today specifically when the wireless communication channel is insecure. We are proposing a protocol which can be customized in variety of situations. We want to use steganography as a complementary tool f
The book features original papers from International Conference on Cryptology & Network Security with Machine Learning (ICCNSML 2023), organized by PSIT, Kanpur, India during 27–29 October 2023. This conference proceeding provides the understanding
Publikováno v:
Algorithms for Intelligent Systems ISBN: 9789811615276
The effect of malicious objects on computer network system has been a burning issue during the last several years. It is well known that malicious objects spread very fast through a susceptible network causing damage to nodes and corrupt the files. T
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9e4c7e8da42abceb9361de9995aa7b90
https://doi.org/10.1007/978-981-16-1528-3_6
https://doi.org/10.1007/978-981-16-1528-3_6
The book features original papers from International Conference on Cryptology & Network Security with Machine Learning (ICCNSML 2022), organized by PSIT, Kanpur, India during 16 – 18 December 2022. This conference proceeding will provide the unders
Publikováno v:
International Journal of Computer Sciences and Engineering. 5:233-236