Impact Factor:6.549
Scopus Suggested Journal: |
International Journal
of Computer Engineering in Research Trends (IJCERT)
Scholarly, Peer-Reviewed, Open Access and Multidisciplinary
International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed,Open Access and Multidisciplinary
ISSN(Online):2349-7084 Submit Paper Check Paper Status Conference Proposal
[1] Cloud Computing Trends: 2017 State of the Cloud Survey, Kim Weins, https://www.rightscale.com/blog/cloud-industry-insights/cloud-computing-trends-2017-state-cloud-survey accessed on 09/12/17 at 6:00 pm [2] Prof. (Ms.) Kimaya Ambekar, Prof. (Dr.) Kamatchi R.Enhanced User Authentication Model in Cloud Computing Security, Springer International Publishing AG 2016, DOI 10.1007/978-3-319-47952-1_26, pg 327-338 [3] Infotechno- Technology is a life, http://www.infotechno.net/cryptography, Accessed on 09/12/17 at 6:00 pm [4] What is symmetric key encryption?, https://www.quora.com/What-is-symmetric-key-encryption, Accessed on 09/12/17 at 6:00 pm [5] Giuseppe, Asymmetric RSA encryption in Java, http://www.giuseppeurso.eu/en/asymmetric-rsa-encryption-in-java/, Accessed on 09/12/17 at 6:00 pm [6]Symmetric-key algorithm, https://en.wikipedia.org/wiki/Symmetric-key_algorithm [7] Advantages and Disadvantages of Asymmetric and Symmetric Cryptosystems, http://www.uobabylon.edu.iq/eprints/paper_1_2264_649.pdf, Accessed on 09/12/17 at 7:00 pm [8] Data Encryption Standard, https://www.tutorialspoint.com/cryptography/data_encryption_standard.htm [9] Ritu Tripathi, Sanjay Agrawal, Comparative Study of Symmetric and Asymmetric Cryptography Techniques, International Journal of Advance Foundation and Research in Computer (IJAFRC), Volume 1, Issue 6, June 2014, ISSN 2348 - 4853 [10] Data Encryption Standard (DES), http://searchsecurity.techtarget.com/definition/Data-Encryption-Standard [11] Triple DES, https://www.tutorialspoint.com/cryptography/triple_des.htm [12] Advanced Encryption Standard, https://www.tutorialspoint.com/cryptography/advanced_encryption_standard.htm [13] Al Jeeva et all, Comparative analysis of performance efficiency and security measures of some encryption algorithms, International Journal of Engineering Research and Applications (IJERA) ISSN: 2248 - 9622 www.ijera.com, Vol. 2, Issue 3, May-Jun 2012, pp.3033-3037 [14] Advanced Encryption Standard (AES),http://searchsecurity.techtarget.com/definition/Advanced-Encryption-Standard,Accessed on 11/12/17 at 3:00 pm [15] Diffie–Hellman key exchange, https://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange, Accessed on 12/12/17 at 3:00 pm [16] RSA (cryptosystem), https://en.wikipedia.org/wiki/RSA_(cryptosystem),Accessed on 12/12/17 at 5:00 pm [17] RSA Public Key Encryption System, https://globlib4u.wordpress.com/2013/10/16/rsa-public-key-encryption-system/, http://www.lsi-contest.com/2008/spec2_e.html#intro, Accessed on 15/12/17 at 2.00pm
![]() | V5I405.pdf |
Latest issue :Volume 10 Issue 1 Articles In press
☞ INVITING SUBMISSIONS FOR THE NEXT ISSUE : |
---|
☞ LAST DATE OF SUBMISSION : 31st March 2023 |
---|
☞ SUBMISSION TO FIRST DECISION : In 7 Days |
---|
☞ FINAL DECISION : IN 3 WEEKS FROM THE DAY OF SUBMISSION |
---|