Zobrazeno 1 - 8
of 8
pro vyhledávání: '"K. A. Fasila"'
Autor:
K. A. Fasila, Sheena Mathew
Publikováno v:
Computers, Materials & Continua. 73:2097-2114
Autor:
P. R. Mahalingam, K. A. Fasila
Publikováno v:
Design and Analysis of Security Protocol for Communication. :95-108
Publikováno v:
Grenze International Journal of Engineering & Technology (GIJET); Jun2022, Vol. 8 Issue 2, p995-999, 5p
Publikováno v:
International Conference on Intelligent Data Communication Technologies and Internet of Things (ICICI) 2018 ISBN: 9783030031459
Online shopping allows consumers to buy goods or services over the Internet. As the popularity of online shopping increases, Debit or Credit card fraud and personal information security are major concerns for customers, merchants, and banks. Identity
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::875014dd0797bbe1ae0dd1269660b3d1
https://doi.org/10.1007/978-3-030-03146-6_162
https://doi.org/10.1007/978-3-030-03146-6_162
Publikováno v:
2017 International Conference on Inventive Computing and Informatics (ICICI).
In this less secure cyber world, our proposed system will provide a way to transfer the data more securely. In this paper, we propose an android application having a method to transform the text into an image using an RGB substitution and then encryp
Publikováno v:
2017 International Conference on Recent Advances in Electronics and Communication Technology (ICRAECT).
Proper identification is important for providing secure facilities and services to user. Cloud computing is involved in our day to day life as it offers several services, storage spaces, applications etc. As the usage increases, vulnerability and sec
Autor:
K. A. Fasila
Publikováno v:
2017 Second International Conference on Electrical, Computer and Communication Technologies (ICECCT).
Cellular Automata based computing paradigm is an efficient platform for modeling complicated computational problems. This can be used for various applications in the field of Cryptography. In this paper, it is used for generating a DNA cryptography b
Autor:
Deepthy Antony, K A Fasila
Publikováno v:
2014 Fourth International Conference on Advances in Computing and Communications.