Please use this identifier to cite or link to this item:
http://103.99.128.19:8080/xmlui/handle/123456789/443
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Sohana, Sarah | - |
dc.contributor.author | Mukta, Rahma Bintey Mufiz | - |
dc.date.accessioned | 2024-07-03T02:42:57Z | - |
dc.date.available | 2024-07-03T02:42:57Z | - |
dc.date.issued | 2016-05-13 | - |
dc.identifier.isbn | 978-1-5090-1268-8 | - |
dc.identifier.uri | http://103.99.128.19:8080/xmlui/handle/123456789/443 | - |
dc.description | The ICIEV provides vibrant opportunities for researchers, industry practitioners and students to share their research experiences, research results, ideas, review of various aspects and practical development experiences on Informatics, Electronics, Computer Vision and related fields. Through various presentations from peer-reviewed accepted papers, Special Talks and networking - the ICIEV provides the avenue to share knowledge, make networks, and develop a community for the new researchers - based on the experiences of experts. The ICIEV will open doors for challenging research areas for future. The ICIEV welcomes you to be part of it - through offering Special Session, Tutorial, Workshop, Special Talk, Panel Discussion, and through submitting your research paper on and related arenas! | en_US |
dc.description.abstract | Cryptography plays a vital role in information security system against malicious attacks. This security system uses some algorithms to scramble data into scribbled text which can only be decrypted by party those possess the associated key. Keys play the most important role in ensuring security of those algorithms. A two keys based method which uses AES as core algorithm is proposed here. This improved method has been developed as application on Android platform which allows the user to encrypt confidential messages before it is transmitted over the network. This application provides a secure, fast and strong encryption of data. There is a huge amount of confusion and diffusion of data during encryption that makes it very hard for an intruder to interpret the encryption pattern and the plain text form of the encrypted data. Comparison between the proposed system and traditional systems show that the proposed one provides enhanced security in data transmission with good performance. | en_US |
dc.description.sponsorship | IEEE, IEEJ, JSME, IEEE Computer Society | en_US |
dc.language.iso | en_US | en_US |
dc.publisher | IEEE | en_US |
dc.relation.ispartofseries | ICIEV; | - |
dc.subject | cryptography | en_US |
dc.subject | encryption | en_US |
dc.subject | keys | en_US |
dc.subject | symmetric key encryption | en_US |
dc.subject | AES | en_US |
dc.subject | DES | en_US |
dc.subject | Tripple DES | en_US |
dc.subject | security | en_US |
dc.title | Agent Command Manipulation System Using Two Keys Encryption Model | en_US |
dc.title.alternative | 5th International Conference on Informatics, Electronics & Vision (ICIEV-2016) | en_US |
dc.title.alternative | ICIEV-2016 | en_US |
dc.type | Article | en_US |
Appears in Collections: | proceedings in CSE |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Agent Command Manipulation System Using Two.pdf | 1.05 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.