Please use this identifier to cite or link to this item: http://103.99.128.19:8080/xmlui/handle/123456789/443
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSohana, Sarah-
dc.contributor.authorMukta, Rahma Bintey Mufiz-
dc.date.accessioned2024-07-03T02:42:57Z-
dc.date.available2024-07-03T02:42:57Z-
dc.date.issued2016-05-13-
dc.identifier.isbn978-1-5090-1268-8-
dc.identifier.urihttp://103.99.128.19:8080/xmlui/handle/123456789/443-
dc.descriptionThe ICIEV provides vibrant opportunities for researchers, industry practitioners and students to share their research experiences, research results, ideas, review of various aspects and practical development experiences on Informatics, Electronics, Computer Vision and related fields. Through various presentations from peer-reviewed accepted papers, Special Talks and networking - the ICIEV provides the avenue to share knowledge, make networks, and develop a community for the new researchers - based on the experiences of experts. The ICIEV will open doors for challenging research areas for future. The ICIEV welcomes you to be part of it - through offering Special Session, Tutorial, Workshop, Special Talk, Panel Discussion, and through submitting your research paper on and related arenas!en_US
dc.description.abstractCryptography plays a vital role in information security system against malicious attacks. This security system uses some algorithms to scramble data into scribbled text which can only be decrypted by party those possess the associated key. Keys play the most important role in ensuring security of those algorithms. A two keys based method which uses AES as core algorithm is proposed here. This improved method has been developed as application on Android platform which allows the user to encrypt confidential messages before it is transmitted over the network. This application provides a secure, fast and strong encryption of data. There is a huge amount of confusion and diffusion of data during encryption that makes it very hard for an intruder to interpret the encryption pattern and the plain text form of the encrypted data. Comparison between the proposed system and traditional systems show that the proposed one provides enhanced security in data transmission with good performance.en_US
dc.description.sponsorshipIEEE, IEEJ, JSME, IEEE Computer Societyen_US
dc.language.isoen_USen_US
dc.publisherIEEEen_US
dc.relation.ispartofseriesICIEV;-
dc.subjectcryptographyen_US
dc.subjectencryptionen_US
dc.subjectkeysen_US
dc.subjectsymmetric key encryptionen_US
dc.subjectAESen_US
dc.subjectDESen_US
dc.subjectTripple DESen_US
dc.subjectsecurityen_US
dc.titleAgent Command Manipulation System Using Two Keys Encryption Modelen_US
dc.title.alternative5th International Conference on Informatics, Electronics & Vision (ICIEV-2016)en_US
dc.title.alternativeICIEV-2016en_US
dc.typeArticleen_US
Appears in Collections:proceedings in CSE

Files in This Item:
File Description SizeFormat 
Agent Command Manipulation System Using Two.pdf1.05 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.