Based blockchain-lightweight cryptography techniques for security information: A verification secure system for user authentication

Author(s):  
I. Hagui ◽  
A. Msolli ◽  
A. Helali ◽  
F. Hassen
2012 ◽  
Vol 2 (2) ◽  
pp. 129-130
Author(s):  
A. Sai Kumar ◽  
◽  
P. Subhadra P. Subhadra
Keyword(s):  

Author(s):  
Manoj Kumar ◽  
Rohit Tanwar

In the computerized age as a result of the broad utilization of web, information covering up in advanced symbolism assumes a fundamental part to guarantee copyright assurance and power from pernicious assaults. Today the exponential development in web clients request secure information correspondence, for that it is required to send the information as encoded or shrouded shape. Numerous data framework security procedures are accessible.Information transmission needs security. Information covering up can be accomplished through numerous techniques. Distinctive information concealing procedures are talked about in this paper which incorporates watermarking, steganography, fingerprinting, cryptography and advanced mark.


2008 ◽  
Vol 3 (1) ◽  
pp. 66-71
Author(s):  
Raj Mohammed ◽  
Shoba Bindu C ◽  
Chandra Sekhar Reddy P ◽  
Satya Narayana B

Sign in / Sign up

Export Citation Format

Share Document