Classical Encryption Techniques
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2012, Vol 3, Issue 1
Abstract
This paper reviews some of the classical encryption and modern techniques which are widely used to solve the problem in open networked systems, where information is being received and misused by adversaries by means of facilitating attacks at various levels in the communication. In this paper the proposition of building the basics of classical encryption and modern techniques and the comparison has been done between each of them.
Authors and Affiliations
Ramandeep Sharma, Richa Sharma, Harmanjit Singh
Theoretical and Computational Perspectives of Arabic Morphological Analyzers and Generators : Theoretical Survey
Morphology analysis is an essential part of most applications of natural language processing (NLP) which included different applications like Machine Translation (MT) and language rule based Information Retrieval (IR). M...
Singleto Multi Clouds for Security in Cloud Computing by using Secret Key Sharing
Now a day Cloud Computing is rapidly using computing technology. For low cost and high-end benefits this cloud computing is utilized. The major issue in this cloud computing is Ensuring the security, because the often st...
A New Approach For Load Balancing In Cloud Computing
Cloud computing is the dynamic delivery of information technology resources and capabilities as a service over the Internet. Cloud computing is a style of computing in which dynamically scalable and often virtualized res...
Comparative Study of Different Technique for Medical Image Segmentation: A Survey
Image analysis and processing can be done using image segmentation as one of the most critical aspect. Various subsequent processes of image analysis such as object representation object description ,feature measurement...
A REVIEW ARTICLE OF CLOUD COMPUTING
Cloud computing has become a significant technology trend, and many experts expect it to reshape information-technology processes and the IT marketplace during the next five years.This keynote paper: presents a 21st cent...