Abstract — Communication is one of the basic necessities of human beings. File transfer is one of the basic forms of communication. Reliability is the key issue raised due to complex nature of network and growth of computer science. In this paper we have devised a technique for file transfer which identifies whether some portion of the file is received corrupt or not, and if yes then exactly what portion is corrupt. This technique provides reliability by eliminating the corruption from a file, hence requiring less bandwidth of the network by reducing the amount of data to be re-sent in case of corruption. The reliability is ensured with the help of file signature generation method which we have devised in this paper. The beauty of this tech...
We observe that a certain RSA-based secure hash function is homomorphic. We describe a protocol base...
A cryptographic network file system has to guarantee confidentiality and integrity of its files, and...
Abstract: Covert channels are used for secret transfer of information. Encryption only protects comm...
Transferring data is one of the key operations performed by millions of users every day. Users do th...
Transferring data is one of the key operations performed by millions of users every day. Users do th...
Transferring data is one of the key operations performed by millions of users every day. Users do th...
In untrusted and trusted computing environments, the problem of secure file transfer between various...
Abstract-Peer-to-peer content distribution networks can suffer from malicious participants that inte...
Abstract: This paper presents a novel encryption-less algorithm to enhance security in transmission ...
Users of computer systems may often require the private transfer of messages/communications between ...
Abstract-In this paper we have introduced secure RSA for secure file transmission. There are many ca...
Abstract — Peer-to-peer content distribution networks can suffer from malicious participants that co...
Abstract—Governments, military, different private organiza-tions, financial institutions and hospita...
In the present work we study applied cryptography. . . The goal of this work is not to study algorit...
Traditional network communication methods lack endogenous security mechanisms, which is the root cau...
We observe that a certain RSA-based secure hash function is homomorphic. We describe a protocol base...
A cryptographic network file system has to guarantee confidentiality and integrity of its files, and...
Abstract: Covert channels are used for secret transfer of information. Encryption only protects comm...
Transferring data is one of the key operations performed by millions of users every day. Users do th...
Transferring data is one of the key operations performed by millions of users every day. Users do th...
Transferring data is one of the key operations performed by millions of users every day. Users do th...
In untrusted and trusted computing environments, the problem of secure file transfer between various...
Abstract-Peer-to-peer content distribution networks can suffer from malicious participants that inte...
Abstract: This paper presents a novel encryption-less algorithm to enhance security in transmission ...
Users of computer systems may often require the private transfer of messages/communications between ...
Abstract-In this paper we have introduced secure RSA for secure file transmission. There are many ca...
Abstract — Peer-to-peer content distribution networks can suffer from malicious participants that co...
Abstract—Governments, military, different private organiza-tions, financial institutions and hospita...
In the present work we study applied cryptography. . . The goal of this work is not to study algorit...
Traditional network communication methods lack endogenous security mechanisms, which is the root cau...
We observe that a certain RSA-based secure hash function is homomorphic. We describe a protocol base...
A cryptographic network file system has to guarantee confidentiality and integrity of its files, and...
Abstract: Covert channels are used for secret transfer of information. Encryption only protects comm...