Embedding a Non-Standard Encryption/Decryption Method with Mathematical Draw Function to Meet Challenges in Mobility
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 9, Issue 5
Abstract
Our innovation and personal information are passes through air in wireless network and their secrecy can be preserved by using any one of the encryption method. Nowadays mobile plays a vital role in passing messages and pictures. New operating systems and functions were introduced in order to handle mobile operations due to restrictions on mobile like storage capacity, size of mobile, availability of tower, etc… This article explains the concepts of standard encryption and decryption methods, how the non-standard encryption/decryption methods used effectively to maintain secrecy, how to convert mathematical symbol into secret form in a quick manner, appearance of converted encrypted form of mathematical figures and embedding conversion and draw function by considering restriction on mobility.
Authors and Affiliations
S . Lakshmi Priya
An Approach for Normalizing Fuzzy Relational Databases Based on Join Dependency
Fuzziness in databases is used to denote uncertain or incomplete data. Relational Databases stress on the nature of the data to be certain. This certainty based data is used as the basis of the normalization approach des...
PMA-Chord: Peer Mobility Adaptable Lookup for Chord Protocol
Structured Overlay Networks provide a promising system for high-performance applications because they may be fault-tolerant, scalable and self managing. Organized overlays provide lookup services that guide keys to nodes...
Distributed Observer Design for Leader following Control of Multi-Agent System with Pinning Technique
This paper is concerned with a leader–follower problem for a multi-agent system designed by the pinning control technique without assuming that the interaction graph is connected. Distributed observers are designed for t...
Deterministic Routing in OSPF for Post Single Link Failure
In the Internet, link-state routing protocols, that are commonly deployed tend to converge globally after any of real-time applications. Topological change in the network i.e. news of the change is propagated to all the...
SVM Based Ranking Model for Dynamic Adaption to Business Domains
Huge information can be obtained from vertical search domains. Often the information is very large in such a way that users need to browse further to get the required piece of information. In this context ranking plays a...