Security of data is imperative factor in data transmission through network. In this paper, we propose another strategy utilizing fuzzy set hypothesis to upgrade the security. The data as content to be transmitted is encrypted by utilizing the AES Rijndael algorithm. The encryption algorithm is the numerical method for performing encryption of data. A key is utilized to figure a message and to interpret it back to the first message. At that point the mixed encrypted content is changed over into the type of numerics by applying the fuzzy set hypothesis. The fuzzy logic will give the content in the zero to one esteem. These numerical before decryption the numerical are again changed over into mixed content. After this, if the key given by the ...
With the arrival and outbreak of high speed internet, www (World Wide Web) and growth of social medi...
Security is a major concern of the internet world because the development of the Internet requires t...
Nowadays, the rapid growth of Internet applications open the doors for people to communicate and do ...
AbstractIn this fast world of networking, secure image transmission of data whether the image having...
Sharing of information in a secured manner is extremely essential in this world of internet technolo...
ABSTRACT This paper evaluates the security of wireless communication network based on the fuzzy log...
The issue of data and information security on the internet and social network has become more seriou...
Abstract—Sahai and Waters introduced a fuzzy id-based encryption (FIBE) scheme in which an identity ...
A new image encryption scheme using the advanced encryption standard (AES), a chaotic map, a genetic...
This article provide analysis about information security using cryptography techniques. After the an...
Abstract — Network security is one of the significant aspects of information security. Network secu...
WSN is a way of handling dangerous and hostile environments safely. It replaces human existence with...
Security has become a buzzword over the current years. As per Wikipedia, 55.1% of global population ...
As our dependency on the digital world increases, our private information becomes widely visible and...
Individual or organizational sensitive data and information need to be prevented from unauthorized ...
With the arrival and outbreak of high speed internet, www (World Wide Web) and growth of social medi...
Security is a major concern of the internet world because the development of the Internet requires t...
Nowadays, the rapid growth of Internet applications open the doors for people to communicate and do ...
AbstractIn this fast world of networking, secure image transmission of data whether the image having...
Sharing of information in a secured manner is extremely essential in this world of internet technolo...
ABSTRACT This paper evaluates the security of wireless communication network based on the fuzzy log...
The issue of data and information security on the internet and social network has become more seriou...
Abstract—Sahai and Waters introduced a fuzzy id-based encryption (FIBE) scheme in which an identity ...
A new image encryption scheme using the advanced encryption standard (AES), a chaotic map, a genetic...
This article provide analysis about information security using cryptography techniques. After the an...
Abstract — Network security is one of the significant aspects of information security. Network secu...
WSN is a way of handling dangerous and hostile environments safely. It replaces human existence with...
Security has become a buzzword over the current years. As per Wikipedia, 55.1% of global population ...
As our dependency on the digital world increases, our private information becomes widely visible and...
Individual or organizational sensitive data and information need to be prevented from unauthorized ...
With the arrival and outbreak of high speed internet, www (World Wide Web) and growth of social medi...
Security is a major concern of the internet world because the development of the Internet requires t...
Nowadays, the rapid growth of Internet applications open the doors for people to communicate and do ...