scholarly journals A Review Paper on Cryptography and Network Security

Author(s):  
Disha Satyan Dahanukar ◽  
Durva Sanjay Shelke

With the explosively growing internet that has been merging with our lives for the past few decades, data and network security has been of utmost importance as society moves towards the age of digital information. As the number of users connected to the web increases, the threat faced by the network because of attackers also increases. Cryptography, the science of information security derived from the inherent needs of humans to converse and share information or communicate selectively at times, has the primary function of sending correct data over the network without any undesirable modifications. In cryptography, the original message is masked or encrypted by the sender and has to be decoded or decrypted by the receiver using a predefined set of algorithms decided before the commencement of the data transmission. Thereby, successfully avoiding redundant people from accessing or understanding the message as it is converted to content unreadable by the human eye.

Author(s):  
Ch. Himabindu

The availability of realistic network data plays a significant role in fostering collaboration and ensuring U.S. technical leadership in network security research. Unfortunately, a host of technical, legal, policy, and privacy issues limit the ability of operators to produce datasets for information security testing. In an effort to help overcome these limitations, several data collection efforts (e.g., CRAWDAD[14], PREDICT [34]) have been established in the past few years. The key principle used in all of these efforts to assure low-risk, high-value data is that of trace anonymization—the process of sanitizing data before release so that potentially sensitive information cannot be extracted.


From old times, information security has been an essential part of human life. Day to day developing new technologies and increasing number of users share information with each other, securing information is becoming more important. For securing information, there are several techniques out of which most common is cryptography. Cryptography is a technique involving securing transmission of messages in presence of adversaries. The basic aim is to hide the information from unauthorized users. Cryptography includes to phases: encryption of plain message and decrypting encrypted message. The aim of this paper is to use new integral transform "Kamal transform" and congruence modulo operator involving ASCII value for encryption and decryption of message.


Author(s):  
Deepinder Singh Sran ◽  
Sheenu Sachdeva

With the occurrence of the World Wide Web and the emergence of ecommerce applications and social networks, organizations across the world generate a large amount of data daily. Information security is the most extreme basic issue in guaranteeing safe transmission of data through the web. Also network security issues are now becoming important as society is moving towards digital information age. As more and more users connect to the internet it attracts a lot of cyber-attacks. It required to protect computer and network security i.e. the critical issues. The pernicious hubs make an issue in the system. It can utilize the assets of different hubs and safe guard the assets of its own. In this paper we provide an overview on Network Security and various techniques through which Network Security can be enhanced i.e. Cryptography. Cryptography and Network Security is used to protect network and data transmission takes place over wireless network.


Author(s):  
Suvarna Sharma ◽  
Amit Bhagat

In the past few decades, the Web has emerged as a treasure of information and web mining is a technique to handle this treasure. During recent years web mining has been a well-researched area. Web mining is the application of the data mining which is useful to extract the knowledge from web. With the progress of web, more and more data are now available for users on web. Web structure mining deals with the contents and hyperlinks on web pages. In this review paper, we have focused on three basic algorithms for evaluating the importance of pages i.e. Page Rank, Weighted Page Rank, and Hyperlink-Induced Topic Search and comparison of those algorithms. Page Rank algorithm is based on back links of the page and it calculates the rank of web pages at indexing time. Weighted Page Rank algorithm scores pages according to their relevancies and rank of a page is calculated by its number of incoming and outgoing links. Hyperlink-induced topic search algorithm is an iterative algorithm developed to quantify each pages value as an authority and as a hub. This study was done basically to explore the link structure algorithms for ranking pages.


Entropy ◽  
2021 ◽  
Vol 23 (5) ◽  
pp. 626
Author(s):  
Ramya Gupta ◽  
Abhishek Prasad ◽  
Suresh Babu ◽  
Gitanjali Yadav

A global event such as the COVID-19 crisis presents new, often unexpected responses that are fascinating to investigate from both scientific and social standpoints. Despite several documented similarities, the coronavirus pandemic is clearly distinct from the 1918 flu pandemic in terms of our exponentially increased, almost instantaneous ability to access/share information, offering an unprecedented opportunity to visualise rippling effects of global events across space and time. Personal devices provide “big data” on people’s movement, the environment and economic trends, while access to the unprecedented flurry in scientific publications and media posts provides a measure of the response of the educated world to the crisis. Most bibliometric (co-authorship, co-citation, or bibliographic coupling) analyses ignore the time dimension, but COVID-19 has made it possible to perform a detailed temporal investigation into the pandemic. Here, we report a comprehensive network analysis based on more than 20,000 published documents on viral epidemics, authored by over 75,000 individuals from 140 nations in the past one year of the crisis. Unlike the 1918 flu pandemic, access to published data over the past two decades enabled a comparison of publishing trends between the ongoing COVID-19 pandemic and those of the 2003 SARS epidemic to study changes in thematic foci and societal pressures dictating research over the course of a crisis.


2021 ◽  
Vol 13 (12) ◽  
pp. 6750
Author(s):  
Andreja Mihailović ◽  
Julija Cerović Smolović ◽  
Ivan Radević ◽  
Neli Rašović ◽  
Nikola Martinović

The main idea of this research is to examine how teleworking has affected employee perceptions of organizational efficiency and cybersecurity before and during the COVID-19 pandemic. The research is based on an analytical and empirical approach. The starting point of the research is a critical and comprehensive analysis of the relevant literature regarding the efficiency of organizations due to teleworking, digital information security, and cyber risk management. The quantitative approach is based on designing a structural equation model (SEM) on a sample of 1101 respondents from the category of employees in Montenegro. Within the model, we examine simultaneously the impact of their perceptions on the risks of teleworking, changes in cyber-attacks during teleworking, organizations’ capacity to respond to cyber-attacks, key challenges in achieving an adequate response to cyber-attacks, as well as perceptions of key challenges related to cybersecurity. The empirical aspects of our study involve constructing latent variables that correspond to different elements of employee perception; namely, their perception of organizational efficiency and the extent to which the digital information security of their organizations has been threatened during teleworking during the pandemic.


2020 ◽  
Vol 10 (18) ◽  
pp. 6553
Author(s):  
Sabrina Azzi ◽  
Stéphane Gagnon ◽  
Alex Ramirez ◽  
Gregory Richards

Healthcare is considered as one of the most promising application areas for artificial intelligence and analytics (AIA) just after the emergence of the latter. AI combined to analytics technologies is increasingly changing medical practice and healthcare in an impressive way using efficient algorithms from various branches of information technology (IT). Indeed, numerous works are published every year in several universities and innovation centers worldwide, but there are concerns about progress in their effective success. There are growing examples of AIA being implemented in healthcare with promising results. This review paper summarizes the past 5 years of healthcare applications of AIA, across different techniques and medical specialties, and discusses the current issues and challenges, related to this revolutionary technology. A total of 24,782 articles were identified. The aim of this paper is to provide the research community with the necessary background to push this field even further and propose a framework that will help integrate diverse AIA technologies around patient needs in various healthcare contexts, especially for chronic care patients, who present the most complex comorbidities and care needs.


Author(s):  
Jonathan Lane ◽  
Tom Barker ◽  
Joseph R. Lewis ◽  
Meitar Moscovitz
Keyword(s):  
The Past ◽  

Author(s):  
Horacio Saggion

Over the past decades, information has been made available to a broad audience thanks to the availability of texts on the Web. However, understanding the wealth of information contained in texts can pose difficulties for a number of people including those with poor literacy, cognitive or linguistic impairment, or those with limited knowledge of the language of the text. Text simplification was initially conceived as a technology to simplify sentences so that they would be easier to process by natural-language processing components such as parsers. However, nowadays automatic text simplification is conceived as a technology to transform a text into an equivalent which is easier to read and to understand by a target user. Text simplification concerns both the modification of the vocabulary of the text (lexical simplification) and the modification of the structure of the sentences (syntactic simplification). In this chapter, after briefly introducing the topic of text readability, we give an overview of past and recent methods to address these two problems. We also describe simplification applications and full systems also outline language resources and evaluation approaches.


Molecules ◽  
2021 ◽  
Vol 26 (21) ◽  
pp. 6755
Author(s):  
Maria J. Matos ◽  
Eugenio Uriarte ◽  
Lourdes Santana

3-Phenylcoumarins are a family of heterocyclic molecules that are widely used in both organic and medicinal chemistry. In this overview, research on this scaffold, since 2010, is included and discussed, focusing on aspects related to its natural origin, synthetic procedures and pharmacological applications. This review paper is based on the most relevant literature related to the role of 3-phenylcoumarins in the design of new drug candidates. The references presented in this review have been collected from multiple electronic databases, including SciFinder, Pubmed and Mendeley.


Sign in / Sign up

Export Citation Format

Share Document