Block based text data partition with RC4 encryption for text data security
نویسندگان
چکیده
منابع مشابه
Amplifying Security for Cipher Text Policy Attribute Based Data Sharing
The rapid growth of usage of Digital technology leads to storage of all categories and types of data in digital media. As the technology is very fast in maintenance and also in data theft. We require providing security for the data stored in the digital media various data security techniques have introduced for the last 5 decades, but all those techniques are only key based techniques. All the ...
متن کاملMining Text Data Mining Text Data
Clustering is a widely studied data mining problem in the text domains. The problem finds numerous applications in customer segmentation, classification, collaborative filtering, visualization, document organization, and indexing. In this chapter, we will provide a detailed survey of the problem of text clustering. We will study the key challenges of the clustering problem, as it applies to the...
متن کاملCorpus based coreference resolution for Farsi text
"Coreference resolution" or "finding all expressions that refer to the same entity" in a text, is one of the important requirements in natural language processing. Two words are coreference when both refer to a single entity in the text or the real world. So the main task of coreference resolution systems is to identify terms that refer to a unique entity. A coreference resolution tool could be...
متن کاملEvaluation of the RC4 Algorithm for Data Encryption
Analysis of the effect of different parameters of the RC4 encryption algorithm where examined. Some experimental work was performed to illustrate the performance of this algorithm based on changing some of these parameters. The execution time as a function of the encryption key length and the file size was examined; this has been stated as complexity and security. Various data types were analyz...
متن کاملData Encryption by Excluding Repetitive Character in Cipher Text
AbstractIn modern world, cryptography hackers try to break a cryptographic algorithm or try to retrieve the key, which is needed to encrypt a message (data), by analyzing the insertion or presence of repetitive bits / characters (bytes) in the message and encrypted message to find out the encryption algorithm or the key used for it. So it is must for a good encryption method to exclude the repe...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Advanced Computer Research
سال: 2016
ISSN: 2249-7277,2277-7970
DOI: 10.19101/ijacr.2016.624019