2019
DOI: 10.21533/pen.v7i3.786
|View full text |Cite
|
Sign up to set email alerts
|

Soft public key cipher

Abstract: Encryption in general is the process of keeping up the secrecy of data (both fixed and versatile) utilizing programs that can Convert and make an interpretation of that data into codes so that whenever got to by unapproved people doesn't They can comprehend anything since what appears to them is a blend of images, numbers and unlimited characters, the file is encrypted And decryption by password, which must be known to both parties (sender and receiver) This is called With symmetric encryption, Decryption mean… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 10 publications
0
1
0
Order By: Relevance
“…The researchers in the security of the WSNs have suggested many security systems that have been improved for these networks with resource limitations. A number of safe and effective routing protocols [3,4][5] [6] and encryption techniques [7,8] [9] and secure data aggregation [10,11] [12], and the key management [13,14] [15] were suggested by many WSNs security researchers. The paper is structured as follows.…”
Section: Introductionmentioning
confidence: 99%
“…The researchers in the security of the WSNs have suggested many security systems that have been improved for these networks with resource limitations. A number of safe and effective routing protocols [3,4][5] [6] and encryption techniques [7,8] [9] and secure data aggregation [10,11] [12], and the key management [13,14] [15] were suggested by many WSNs security researchers. The paper is structured as follows.…”
Section: Introductionmentioning
confidence: 99%