Trust Negotiations Using Cryptographic Approach
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 5
Abstract
Security involves , any person or an organization has certain entities or attributes which cannot be disclosed directly to any other organization or third person , so the main idea of our project is to safe guard or encrypt the very sensitive entities of a person or organization by encrypting them by using the public key generated and decrypting them by using the private key which is generated at the initial key generation stage. After which public key is used for the encryption and generated private key pair is used at the time of decryption.
Authors and Affiliations
Sandeep. V , Gitanjali . J
PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH
In this paper, we propose a novel approach “Routing based on Best First Search Technique (RBFS)” to improve the erformance of Dynamic Source Routing (DSR) for mobile d-hoc wireless networks. The proposed scheme tries t...
Malaysian Car Number Plate Detection System Based on Template Matching and Colour Information
This paper presents a method for Malaysian car number plate detection system. This method utilizes template matching echnique to approximate the location of the number plate region. Using the output from this template m...
An Approach to Active Queue Management in Computer Network
Active queue management is a key technique for reducing the packet drop rate in the internet. This packet dropping mechanism is used in a router to minimize congestion when the packets are dropped before queue gets full...
Integrations of Remote Sensing and GIS to Land Use and Land Cover Change Detection of Coimbatore District
Changes in Land use and land Cover is a dynamic process taking place on the surface, and the spatial distribution of the changes that have taken place over a period of time and space is of immense importance in many a na...
Comparative Evaluation of Packet Classification Algorithms, with Implementation
in a realm of ever-increasing Internet connectivity, together with swelling computer security threats, security-cognizant network applications technology is gaining widespread popularity. Packet classifiers are extensive...