Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 5 publications
0
5
0
Order By: Relevance
“…Linear non-homogeneous recurrence is a non-homogenous recurrence relation [ 11 ] with constant coefficients is a recurrence relation of the form , where real numbers, and is a function depending only on . The recurrence relation , is called the associated homogeneous recurrence relation.…”
Section: Proposed Cryptographic Engineering Techniquementioning
confidence: 99%
See 1 more Smart Citation
“…Linear non-homogeneous recurrence is a non-homogenous recurrence relation [ 11 ] with constant coefficients is a recurrence relation of the form , where real numbers, and is a function depending only on . The recurrence relation , is called the associated homogeneous recurrence relation.…”
Section: Proposed Cryptographic Engineering Techniquementioning
confidence: 99%
“…Thus, a message is made secured from the intruders. Involving the same key used at the encryption and decryption processes, is termed as symmetric key cryptography [ 11 ]. This paper presents a secured transmission of cardiological diseases related information.…”
Section: Introductionmentioning
confidence: 99%
“…Linear non-homogeneous recurrence is a non-homogenous recurrence relation [10] with constant coefficients is a recurrence relation of the form ‚ = OE ‚ Here the concept of recurrence relation is used for random number generation that has been implemented for the session key generation in this paper. This novel idea of key generation is a unique concept in discrete mathematics [42][43].…”
Section: Proposed Session Key Generation Based On Recurrence Relationmentioning
confidence: 99%
“…In this sub-section, the correlation [10,17] between ASCII difference and total number of changed characters has been carried out on different sets of cardiac files. A secured cryptographic engineering technique should transform a text file (.pdf, .docx, .txt, .xls, etc) into a randomized encrypted file with low correlation.…”
Section: Correlation Analysismentioning
confidence: 99%
See 1 more Smart Citation