A Novel DNA Encryption Technique Using Efficient Key Generation Method For Secure Data
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 10
Abstract
Information innovation is creating orderly, meanwhile security of information is genuine concern. There are diverse customers and affiliations who need to keep their vital data from attackers and software engineers. Diverse cryptographic systems are made in past years. Another field of cryptography is ascending in perspective of DNA figuring on account of high stockpiling cut-off, limitless parallelism and phenomenal vitality capability of natural DNA. This field is in starting stage so an extensive measure of investigation must be done yet. In this we are showing a DNA encryption methodology in light of cross section control and secure key time arrangement.
Authors and Affiliations
Mrs. Ardhani Siva Sravanthi| Dept. of CSE, Kakinada Institute of Engineering and Technology for women, Kakinada, S. Sushma| Dept. of CSE, Kakinada Institute of Engineering and Technology for women, Kakinada
We portray Diplo Cloud, a proficient and versatile appropriated RDF information administration framework for the cloud. As opposed to past methodologies, Diplo Cloud runs a physiological examination of both case and...
A New Clustering Technique On Text In Sentence For Text Mining
Clustering is a commonly considered data mining problem in the text domains. The problem finds numerous applications in customer segmentation, classification, collaborative filtering, visualization, document organizat...
Probity And Speculations Yielding Model For Multi Clouds
Cloud computing is a latest trend in present scenario. Cloud computing definitely makes sense if your own security is weak, missing features of understanding and privacy. The cloud acts as a big black box, nothing in...
Ann Based Distribution Static Compensator For Power Quality Improvement With Linear Sinusoidal Tracer Control Algorithm
In this paper an ANN based DSTATCOM is proposed for reactive power compensation, harmonics elimination, zero voltage regulation, power factor correction, neutral current compensation and unbalance caused by various l...
Securing Manets By Using An Intrusion Detection System (Eaack)
MANET arrangement may diverge depending on its application from a small static network that is extremely power inhibited to a large-scale, mobile, highly dynamic network. Every node works both as a transmitter and a...