2017 2nd International Conference on Anti-Cyber Crimes (ICACC) 2017
DOI: 10.1109/anti-cybercrime.2017.7905274
|View full text |Cite
|
Sign up to set email alerts
|

Preventing and securing data from cyber crime using new authentication method based on block cipher scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 8 publications
0
4
0
Order By: Relevance
“…In this security scheme, author used simple integer for symmetric key and modular 37 and RSA public key algorithm. On implementation of this combination of hybrid algorithm concluded many significant point [29]. Prakash Kuppuswamy, Rashida Banu, Nithya Rekha (2017) describes security aspects of Cyber-crime.…”
Section: Prakash Kuppuswamy Saeed Q Y Al-khalidi (2014)mentioning
confidence: 99%
See 1 more Smart Citation
“…In this security scheme, author used simple integer for symmetric key and modular 37 and RSA public key algorithm. On implementation of this combination of hybrid algorithm concluded many significant point [29]. Prakash Kuppuswamy, Rashida Banu, Nithya Rekha (2017) describes security aspects of Cyber-crime.…”
Section: Prakash Kuppuswamy Saeed Q Y Al-khalidi (2014)mentioning
confidence: 99%
“…The RFID reader transmits signals to the server about the object which can be attached with the manufacturer device. [28][29][30][31]. For the aspects of security concern of wired networks and wireless networks facing various vulnerabilities by the trespassers.…”
Section: Introductionmentioning
confidence: 99%
“…Cryptography [10] is one of the renowned approaches in IT security that is commonly used in educational systems [11], cybercrime prevention [12], business, and finance data protection [13], health care data security [14], and many more. It is one of the renowned methods in security that concerns data integrity, confidentiality, authentication to a wireless communication system, and several other security services where information transfer between different users takes place [10]- [12]. To protect the information, data are transformed into an unintelligible format using varied cipher technologies [15].…”
Section: Introductionmentioning
confidence: 99%
“…Data protection is one of the most significant methods to preventing data from cyber criminals. It provides data privacy, network security, integrity, and identity management to access the data authorized personnel's [17]. Malware scanners: is a mechanism to search malicious code or harmful viruses available in all the files and documents present in the system.…”
Section: Cybersecurity Techniquesmentioning
confidence: 99%