z-logo
open-access-imgOpen Access
Cryptographic Security using Various Encryption and Decryption Method
Author(s) -
Ritu Ritu Goyal,
Mehak Khurana
Publication year - 2017
Publication title -
international journal of mathematical sciences and computing
Language(s) - English
Resource type - Journals
eISSN - 2310-9033
pISSN - 2310-9025
DOI - 10.5815/ijmsc.2017.03.01
Subject(s) - computer science , encryption , computer security , wireless , cryptography , internet of things , wireless sensor network , the internet , cryptographic primitive , computer network , cryptographic protocol , wireless network , telecommunications , world wide web
Fast development in universal computing and the growth in radio/wireless and mobile strategies have led to the extended use of application space for Radio Frequency (RFID), wireless sensors, Internet of things (IoT). There are numerous applications that are safe and privacy sensitive. The increase of the new equipments has permitted intellectual methods of linking physical strategies and the computing worlds through numerous network interfaces. Consequently, it is compulsory to take note of the essential risks subsequent from these communications. In Wireless systems, RFID and sensor linkages are extremely organized in soldierly, profitable and locomotive submissions. With the extensive use of the wireless and mobile devices, safety has therefore become a major concern. As a consequence, need for extremely protected encryption and decryption primitives in such devices is very important than before.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom