Meticulous Tasks of Various Cryptographic Techniques in Secure Communications
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2013, Vol 5, Issue 4
Abstract
Our main intention of writing this paper is to provide a understandable knowledge about cryptographic techniques. This paper deals with various Message Authentication Codes, Hash functions and encryption techniques and provides in-depth analysis of these techniques. This paper also provides a discussion of how the two related fields of encryption and hash functions are complementary, not replacement technologies for one another.
Authors and Affiliations
Dr. P. Ramesh Babu , D. Nagamalleswara Rao , Hunde Merga Dugassa , Abebe Gemeda
Image Search Reranking
The existing methods for image search re ranking suffer from the unfaithfulness of the as sumptions under which the text-based images search result. The resulting images contain more irrelevant images. Hence the re ranki...
Real Time Detection of Odd Behavior and Irrelevant Promotion in Video Sharing Systems
Metacafe is one of the most popular video sharing system among all online video sharing systems, these video sharing systems provide features that allow users to post a video as a response to the topic that is being disc...
Wireless Sensor Based Remote Monitoring System For Fluoride Affected Areas Using GPRS and GIS
Recent developments in the availability of low-cost integrated General Packet Radio Service (GPRS)/Global Positioning Systems (GPS) modem and publically available web based Geographical Information Systems (GIS)have enab...
Optimizing Resource Allocation in IAAS Clouds
Cloud computing is a phenomenon which bestows new model of computing. It has various service modes. The service model which provides on-demand access to computing resources is known as infrastructure-as-a-service (IaaS)....
Literature Survey on Preference Database
Preference data base (Pref DB) used to provide appropriate recommendations to the users on their relevant search and preferences. The design is made such that user interested data is obtained from the database. PrefDB us...