Trust Negotiations Using Cryptographic Approach

Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 5

Abstract

Security involves , any person or an organization has certain entities or attributes which cannot be disclosed directly to any other organization or third person , so the main idea of our project is to safe guard or encrypt the very sensitive entities of a person or organization by encrypting them by using the public key generated and decrypting them by using the private key which is generated at the initial key generation stage. After which public key is used for the encryption and generated private key pair is used at the time of decryption.

Authors and Affiliations

Sandeep. V , Gitanjali . J

Keywords

Related Articles

PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH

In this paper, we propose a novel approach “Routing based on Best First Search Technique (RBFS)” to improve the erformance of Dynamic Source Routing (DSR) for mobile d-hoc wireless networks. The proposed scheme tries t...

Malaysian Car Number Plate Detection System Based on Template Matching and Colour Information

This paper presents a method for Malaysian car number plate detection system. This method utilizes template matching echnique to approximate the location of the number plate region. Using the output from this template m...

An Approach to Active Queue Management in Computer Network

Active queue management is a key technique for reducing the packet drop rate in the internet. This packet dropping mechanism is used in a router to minimize congestion when the packets are dropped before queue gets full...

Integrations of Remote Sensing and GIS to Land Use and Land Cover Change Detection of Coimbatore District

Changes in Land use and land Cover is a dynamic process taking place on the surface, and the spatial distribution of the changes that have taken place over a period of time and space is of immense importance in many a na...

Comparative Evaluation of Packet Classification Algorithms, with Implementation

in a realm of ever-increasing Internet connectivity, together with swelling computer security threats, security-cognizant network applications technology is gaining widespread popularity. Packet classifiers are extensive...

Download PDF file
  • EP ID EP102804
  • DOI -
  • Views 106
  • Downloads 0

How To Cite

Sandeep. V, Gitanjali . J (2011). Trust Negotiations Using Cryptographic Approach. International Journal on Computer Science and Engineering, 3(5), 2086-2092. https://europub.co.uk./articles/-A-102804