2017 International Conference on Recent Innovations in Signal Processing and Embedded Systems (RISE) 2017
DOI: 10.1109/rise.2017.8378145
|View full text |Cite
|
Sign up to set email alerts
|

A new way to enhance efficiency & security by using symmetric cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…Encryption protects privacy by encrypting the individuals' data and information. In symmetric encryption, two parties need to share an encryption/decryption key, while the public-key is needed for encrypting data or message and a private-key is necessary for decryption [37,38].…”
Section: Encryptionmentioning
confidence: 99%
See 1 more Smart Citation
“…Encryption protects privacy by encrypting the individuals' data and information. In symmetric encryption, two parties need to share an encryption/decryption key, while the public-key is needed for encrypting data or message and a private-key is necessary for decryption [37,38].…”
Section: Encryptionmentioning
confidence: 99%
“…In symmetric encryption, two parties need to share an encryption/decryption key, while the public-key is needed for encrypting data or message and a private-key is necessary for decryption. 37,38 Identity-based encryption is a useful approach in which the system uses the identity of the user such as name or email address (as public-key) for encrypting the message. 39 The recipient does not need the pair of public/private key for decryption.…”
Section: Encryptionmentioning
confidence: 99%