Geo Informatics team will port its current method of surveying which is on paper based on web based and mobile application. All this survey data are confidential for Government purpose. With the current revolution of smart devices, this paper exercise can be converted to digital experience, thereby reducing, analyzing time, increasing accuracy and this data should be secure. These systems require efficient and fast encryption algorithm because all data are confidential data and the data should not to be exposed. Various algorithms are already existing. As our system requirement symmetric algorithm is applicable. A number of symmetric key encryption algorithms like Vernam cipher, DES, 2 DES, AES, IDEA provide better security, but their execu...
Recently the importance of mobile security coincides with the development of mobile computing. Mobil...
This article provide analysis about information security using cryptography techniques. After the an...
In the past years, the Internet of Things (IoT) used in different applications and very wide range o...
Current era is digital and has elite advancement in technology, almost in every field things are bec...
Internet & smart phone makes easy to access and share data from anywhere in the world. Every day ter...
With the arrival and outbreak of high speed internet, www (World Wide Web) and growth of social medi...
Security has become a buzzword over the current years. As per Wikipedia, 55.1% of global population ...
ABSTRACT: Securing mobile and smartphone data is vital issue in the communication industry and schem...
Cyber security ensures a secure information exchange and enables communication through the Internet....
In this fast developing world, the interchange of information is playing a key role. Everything need...
Cryptography considered being the most vital component in information security because it is respons...
The increased exchange of data over the Internet in the past two decades has brought data security a...
In the course of the past 30 years, data has become pivotal to all aspects of human life. Data gener...
Abstract-- The present era resembles the digital world, in which everything irrespective of technolo...
Today’s internet world is very competitive and to survive in such a competitive world there must be ...
Recently the importance of mobile security coincides with the development of mobile computing. Mobil...
This article provide analysis about information security using cryptography techniques. After the an...
In the past years, the Internet of Things (IoT) used in different applications and very wide range o...
Current era is digital and has elite advancement in technology, almost in every field things are bec...
Internet & smart phone makes easy to access and share data from anywhere in the world. Every day ter...
With the arrival and outbreak of high speed internet, www (World Wide Web) and growth of social medi...
Security has become a buzzword over the current years. As per Wikipedia, 55.1% of global population ...
ABSTRACT: Securing mobile and smartphone data is vital issue in the communication industry and schem...
Cyber security ensures a secure information exchange and enables communication through the Internet....
In this fast developing world, the interchange of information is playing a key role. Everything need...
Cryptography considered being the most vital component in information security because it is respons...
The increased exchange of data over the Internet in the past two decades has brought data security a...
In the course of the past 30 years, data has become pivotal to all aspects of human life. Data gener...
Abstract-- The present era resembles the digital world, in which everything irrespective of technolo...
Today’s internet world is very competitive and to survive in such a competitive world there must be ...
Recently the importance of mobile security coincides with the development of mobile computing. Mobil...
This article provide analysis about information security using cryptography techniques. After the an...
In the past years, the Internet of Things (IoT) used in different applications and very wide range o...