Location Based Encryption-Decryption Approach for Data Security

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Approach to Improve the Data Security using Encryption and Decryption Technique

Cryptography is an art and science. It is a playing major role in information and security division. The main aim of the cryptography is protecting the data from unauthorized users or hackers. “Cryptography is subject contains two parts one is encryption and another one decryption. Encryption is a process converting the plain text to cipher text using some keys. Decryption is a process of conve...

متن کامل

Data Encryption and Decryption Using ANZL Algorithm

What is the ANZL Algorithm? It is a genuine result of our work which is theoretically and practically proved. By using the ANZL Algorithm, we can test whether a given number belongs to Lucas’s series. It can also be used to find a sequence of Lucas’s numbers, starting from any number . If a given number completes the relation , we can say that it is a Lucas number and we mark it as . From the p...

متن کامل

Attribute based Encryption and Decryption Technique

Inside a dispersed foriegn atmosphere, anyone receives a untrusted company which has a change for better crucial allowing this foriegn to turn any kind of ABE ciphertext fulfilled through the wearer's features. Stability of ABE technique with outsourced decryption makes certain that a foe (including any destructive cloud) aren't going to be capable to study everything about the encrypted meanin...

متن کامل

Time stamp based ECC encryption and decryption

Elliptic Curve Cryptography (ECC) provides a secure means of exchanging keys among communicating hosts using the diffie hellman key exchange algorithm. Encryption and decryption of texts and messages have also been attempted. In the paper on Knapsack over ECC algorithm, the authors presented the implementation of ECC by first transforming the message into an affine point on the EC, and then app...

متن کامل

Attribute-based encryption with encryption and decryption outsourcing

In this paper we propose a new scheme for ciphertext-policy attribute-based encryption that allows outsourcing of computationally expensive encryption and decryption steps. The scheme constitutes an important building block for mobile applications where both the host and users use mobile devices with limited computational power. In the proposed scheme, during encryption the host involves a semi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computer Applications Technology and Research

سال: 2014

ISSN: 2319-8656

DOI: 10.7753/ijcatr0310.1002