Author of the publication

A General Session Based Bit Level Block Encoding Technique Using Symmetric Key Cryptography to Enhance the Security of Network Based Transmission

, and . International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), volume 2 of IFIP Advances in Information and Communication Technology, page 31-42. Springer, (June 2012)
DOI: 10.5121/ijcseit.2012.2302

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A modified column block Toeplitz matrix for compressed sensing., and . Signal Image Video Process., 17 (6): 3083-3090 (2023)A 3D Chaotic Dynamics-Assisted Color Image Authentication Technique in Multicore Milieu: Multicore Implementation of 3D RGB Steganography., , and . Int. J. Softw. Innov., 10 (1): 1-14 (2022)Space Efficient Cryptographic Protocol Using Recursive Bitwise & Pairs Of Bits Of Operation (RBPBO), and . CoRR, (2012)A comprehension based intelligent assessment architecture., , and . TALE, page 368-371. IEEE, (2017)An intelligent mining technique for CBL., , and . TALE, page 303-306. IEEE, (2017)Separable Discrete Hartley Transform Based Invisible Watermarking for Color Image Authentication (SDHTIWCIA)., and . ACITY (2), volume 177 of Advances in Intelligent Systems and Computing, page 767-776. Springer, (2012)A General Session Based Bit Level Block Encoding Technique Using Symmetric Key Cryptography to Enhance the Security of Network Based Transmission, and . International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), volume 2 of IFIP Advances in Information and Communication Technology, page 31-42. Springer, (June 2012)Rough set based lattice structure for knowledge representation in medical expert systems: low back pain management case study., , , and . CoRR, (2018)Reversible Steganography and Authentication via Transform Encoding. Studies in Computational Intelligence Springer, (2020)Sensor node assisted DTN for a post-disaster scenario., , and . ICDCN, page 401-404. ACM, (2019)