Zobrazeno 1 - 10
of 33
pro vyhledávání: '"Ramchandra Mangrulkar"'
Publikováno v:
Journal of Information and Telecommunication, Vol 8, Iss 2, Pp 280-300 (2024)
ABSTRACTIn today's social networking era, information security breaches are at an all-time high, especially when it comes to texts and images, which should come as no surprise. Integrity is therefore crucial for information sharing over an unprotecte
Externí odkaz:
https://doaj.org/article/dba03555217d4ba5856d0c4218e64db9
Publikováno v:
Journal of Information and Telecommunication, Vol 7, Iss 3, Pp 270-303 (2023)
ABSTRACTThis paper presents a novel approach for encrypting images using a Sudoku as its encryption key. This algorithm uses both symmetric and asymmetric key cryptography. It works with any type of data, Sudoku size, and keyspace. The image undergoe
Externí odkaz:
https://doaj.org/article/46753c7588f64b0b947f5a1c38316e88
Publikováno v:
Cyber Security and Applications, Vol 2, Iss , Pp 100030- (2024)
The 21st century has seen a significant increase in the usage of multimedia to transfer information. Algorithms used for the encryption of plain text are not suitable for multimedia encryption. This paper proposes a new and unique algorithm - Rubik
Externí odkaz:
https://doaj.org/article/3f9573bd34e44bbcacd1151795a731e1
Autor:
Aryan Pathare, Ramchandra Mangrulkar, Kartik Suvarna, Aryan Parekh, Govind Thakur, Aruna Gawade
Publikováno v:
International Journal of Information Management Data Insights, Vol 3, Iss 2, Pp 100177- (2023)
In the 21st-century, data is as valuable as gold. Many data-centric applications are generating a vast amount of data. Businesses can use this generated data to pinpoint the various sources of problems, if any. In addition, the data can help enterpri
Externí odkaz:
https://doaj.org/article/b189d72b44704497a0eccae9b591f855
Publikováno v:
International Journal of Information Management Data Insights, Vol 1, Iss 2, Pp 100048- (2021)
Distributed Denial of Service (DDoS) attack is one of the most dangerous attacks that result in bringing down the server(s) and it is essential to classify the exact attack to implement robust security measures. In this work, we present an approach f
Externí odkaz:
https://doaj.org/article/9ce2e788300f4c1bb5a0a36f0605e672
Publikováno v:
Journal of Applied Security Research. :1-24
Publikováno v:
Journal of Applied Security Research. :1-34
Publikováno v:
2023 IEEE 8th International Conference for Convergence in Technology (I2CT).
Publikováno v:
Generative Adversarial Networks and Deep Learning ISBN: 9781003203964
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::02008e6e643b8b820bbd0ef26de32cf2
https://doi.org/10.1201/9781003203964-7
https://doi.org/10.1201/9781003203964-7
Publikováno v:
Cyber Security and Digital Forensics. :163-204