2017 IEEE International Conference on Intelligent Techniques in Control, Optimization and Signal Processing (INCOS) 2017
DOI: 10.1109/itcosp.2017.8303131
View full text |Buy / Rent full text
|
Sign up to set email alerts
|
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 4 publications
0
4
0
Order By: Relevance
“…Chinnasamy and Deepalakshmi [22] introduced improved key generation scheme for RSA algorithm and speed of proposed method is higher as compared to other RSA methods. In [23], [24] discussed hybrid algorithm for healthcare system and used One Time Pad with RSA algorithm in cryptography techniques. In [25]- [28] explained the data storage and data retrieval framework for cloud and discussed the searchable encryption process for data storage and decryption process for data retrieval.…”
Section: Related Workmentioning
confidence: 99%
“…Chinnasamy and Deepalakshmi [22] introduced improved key generation scheme for RSA algorithm and speed of proposed method is higher as compared to other RSA methods. In [23], [24] discussed hybrid algorithm for healthcare system and used One Time Pad with RSA algorithm in cryptography techniques. In [25]- [28] explained the data storage and data retrieval framework for cloud and discussed the searchable encryption process for data storage and decryption process for data retrieval.…”
Section: Related Workmentioning
confidence: 99%
“…Karthik et al creates an encryption method from a combination of symmetric key and asymmetric key algorithm to increase the level of security in data protection. This method can solve the problem on a symmetric key that sends the security key to use the decryption process and reduces the computing time on the asymmetric key [11]. The plaintext data is encrypted using the OTP algorithm.…”
Section: Related Workmentioning
confidence: 99%
“…The value of z is 64 bits, 512 bits and 1024 bits. The random number of plaintext is encrypted using asymmetric key algorithm with the formula (11). While the output of encryption is decrypted using formula (12).…”
Section: B Encrypting and Decrypting Random Number Of Plaintextmentioning
confidence: 99%
“…It cannot however be extended to multimedia data because it offers protection only for lightweight data. The use of both the symmetric and Asymmetric-key (RSA), to provide strong protection, was suggested by Karthiket al, [12]. The effect of this method was better safety.…”
mentioning
confidence: 99%