首页 > 最新文献

2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE)最新文献

英文 中文
A rule based mathematical model to improve risk assessment on cloud server 基于规则的云服务器风险评估数学模型
Akash Devgun
When the communication is performed publicly one of the major challenges is the reliability of the communication. When this communication is performed on a cloud like distributed system where all services, products and infrastructure is available publicly with personal access capabilities, the reliability factor becomes more critical. The reliability itself is a complex form of measurement that includes the security, efficiency and the satisfaction level for the customer. In this presented work, a secure and reliable access over the cloud is being presented where different degree of reliability can be achieved by the customer. The presented work is a middle layer architecture where multiple clients are connected with reliability layer as the middle layer to access the multiple clouds. At the time of registration, users can opt the degree of reliability required by selecting the access degree. Based on this requirement, the security level and the cost of the cloud access will be decided. The presented work is the dynamic security structure specification in which all the reliability vectors are divided under 10 reliability features. These features include three main aspects called authenticity, control and availability. The authenticity is here being opted in form of single password authentication, generic authentication, code based authentication. The control is here defined in terms of public key secure data communication, private key secured communication, and tunnel based communication. The availability vector basically defines the authentication required for restricted area access, session based access or all page access. Each vector will be assigned by different cost and weightage vectors. Once the weightage and the cost will be assigned to the system, the fuzzy based analysis will be performed to identify the cost and risk vector over the system in a nominal form. Once a user is registered to the system, he has to select the degree of reliability based on which the security level and the cost of security will be decided for the users. The presented work is implemented in Java environment. The obtained results show the effective cloud security assessment and user security role assignment.
当通信公开进行时,主要的挑战之一是通信的可靠性。当这种通信在类似云的分布式系统上执行时,所有服务、产品和基础设施都是公开可用的,具有个人访问功能,可靠性因素变得更加关键。可靠性本身是一种复杂的测量形式,包括安全性、效率和客户满意度。在本文中,介绍了一种安全可靠的云访问方式,其中客户可以实现不同程度的可靠性。提出的工作是一个中间层架构,其中多个客户端以可靠性层作为中间层连接以访问多个云。在注册时,用户可以通过选择访问程度来选择所需的可靠性程度。基于这一需求,将决定云访问的安全级别和成本。本文的工作是动态安全结构规范,其中所有的可靠性向量被划分为10个可靠性特征。这些特性包括三个主要方面,即真实性、控制性和可用性。其真实性主要有单密码认证、通用认证和基于代码的认证三种形式。这里根据公钥安全数据通信、私钥安全通信和基于隧道的通信来定义控制。可用性向量基本上定义了受限区域访问、基于会话的访问或所有页面访问所需的身份验证。每个向量将被分配不同的成本和权重向量。一旦将权重和成本分配给系统,将执行基于模糊的分析,以名义形式确定系统的成本和风险向量。一旦用户注册到系统,他必须选择可靠性程度,以此为基础为用户决定安全级别和安全成本。本文工作是在Java环境中实现的。结果表明,该方法能够有效地进行云安全评估和用户安全角色分配。
{"title":"A rule based mathematical model to improve risk assessment on cloud server","authors":"Akash Devgun","doi":"10.1109/ICECCE.2014.7086617","DOIUrl":"https://doi.org/10.1109/ICECCE.2014.7086617","url":null,"abstract":"When the communication is performed publicly one of the major challenges is the reliability of the communication. When this communication is performed on a cloud like distributed system where all services, products and infrastructure is available publicly with personal access capabilities, the reliability factor becomes more critical. The reliability itself is a complex form of measurement that includes the security, efficiency and the satisfaction level for the customer. In this presented work, a secure and reliable access over the cloud is being presented where different degree of reliability can be achieved by the customer. The presented work is a middle layer architecture where multiple clients are connected with reliability layer as the middle layer to access the multiple clouds. At the time of registration, users can opt the degree of reliability required by selecting the access degree. Based on this requirement, the security level and the cost of the cloud access will be decided. The presented work is the dynamic security structure specification in which all the reliability vectors are divided under 10 reliability features. These features include three main aspects called authenticity, control and availability. The authenticity is here being opted in form of single password authentication, generic authentication, code based authentication. The control is here defined in terms of public key secure data communication, private key secured communication, and tunnel based communication. The availability vector basically defines the authentication required for restricted area access, session based access or all page access. Each vector will be assigned by different cost and weightage vectors. Once the weightage and the cost will be assigned to the system, the fuzzy based analysis will be performed to identify the cost and risk vector over the system in a nominal form. Once a user is registered to the system, he has to select the degree of reliability based on which the security level and the cost of security will be decided for the users. The presented work is implemented in Java environment. The obtained results show the effective cloud security assessment and user security role assignment.","PeriodicalId":223751,"journal":{"name":"2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127626018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modified low power STUMPS architecture 改进的低功耗STUMPS架构
M. Nayana, S. Yellampalli, G. Harish
BIST is one of the DFT techniques in which the test circuitry will be present along with the CUT. Different BIST architectures are proposed in order to reduce the area overhead, power overhead, test time and test costs. The STUMPS architecture is best suited for BIST environment in terms of area and power, but it requires external TPG and Compactor. This paper presents the modified low power STUMPS architecture which eliminates the need for external TPG, by modifying one of the scan chains to operate in both scan and TPG mode. The proposed architecture is tested by considering 16×16 multiplier as CUT and results shows that area overhead is reduced by 4.4 % when compared to STUMPS architecture.
BIST是一种DFT技术,其中测试电路将与CUT一起出现。为了减少面积、功耗、测试时间和测试成本,提出了不同的BIST架构。就面积和功耗而言,STUMPS体系结构最适合于BIST环境,但它需要外部TPG和compator。本文提出了一种改进的低功耗STUMPS架构,通过修改其中一条扫描链,使其在扫描和TPG模式下同时工作,从而消除了对外部TPG的需求。将16×16乘法器作为CUT对该架构进行了测试,结果表明,与STUMPS架构相比,该架构的面积开销减少了4.4%。
{"title":"Modified low power STUMPS architecture","authors":"M. Nayana, S. Yellampalli, G. Harish","doi":"10.1109/ICECCE.2014.7086631","DOIUrl":"https://doi.org/10.1109/ICECCE.2014.7086631","url":null,"abstract":"BIST is one of the DFT techniques in which the test circuitry will be present along with the CUT. Different BIST architectures are proposed in order to reduce the area overhead, power overhead, test time and test costs. The STUMPS architecture is best suited for BIST environment in terms of area and power, but it requires external TPG and Compactor. This paper presents the modified low power STUMPS architecture which eliminates the need for external TPG, by modifying one of the scan chains to operate in both scan and TPG mode. The proposed architecture is tested by considering 16×16 multiplier as CUT and results shows that area overhead is reduced by 4.4 % when compared to STUMPS architecture.","PeriodicalId":223751,"journal":{"name":"2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122129639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Reversible image watermarking using interpolation technique 利用插值技术进行可逆图像水印
K. Parasuraman, G. Deeparani
In this paper presents a novel reversible watermarking scheme. The proposed scheme use an interpolation technique to generate residual values named as interpolation error. Additionally apply the additive expansion to these interpolation-errors, this project achieve a highly efficient reversible watermarking scheme which can guarantee high image quality without sacrificing embedding capacity. The experimental results show the proposed reversible scheme provides a higher capacity and achieves better image quality for watermarked images. The computational cost of the proposed scheme is small.
提出了一种新的可逆水印方案。该方案采用插值技术生成插值误差残差。此外,对这些插值误差进行加性扩展,实现了一种高效的可逆水印方案,在不牺牲嵌入容量的前提下保证了高图像质量。实验结果表明,所提出的可逆方案对水印图像提供了更高的容量和更好的图像质量。该方案的计算量很小。
{"title":"Reversible image watermarking using interpolation technique","authors":"K. Parasuraman, G. Deeparani","doi":"10.1109/ICECCE.2014.7086658","DOIUrl":"https://doi.org/10.1109/ICECCE.2014.7086658","url":null,"abstract":"In this paper presents a novel reversible watermarking scheme. The proposed scheme use an interpolation technique to generate residual values named as interpolation error. Additionally apply the additive expansion to these interpolation-errors, this project achieve a highly efficient reversible watermarking scheme which can guarantee high image quality without sacrificing embedding capacity. The experimental results show the proposed reversible scheme provides a higher capacity and achieves better image quality for watermarked images. The computational cost of the proposed scheme is small.","PeriodicalId":223751,"journal":{"name":"2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131447544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 149
Battery charging using induction motor's Slip power 使用感应电机的滑动电源为电池充电
V. Sailaja, E. R. Harshan, A. Voleti, B. Reddy
Mankind is facing major issues, power shortages is one among them. Instead of going for installations of new power houses substantial use of wastage power can reduce the intensity of the issue. Industries contribute major part of the load in any grid. There will be huge power losses in industrial applications. So, efficient installations of power recovery systems as a part of demand side management will reduce these power shortages to some extent. Almost all industries run on three phase Induction motor which is widely used. In Slip ring Induction motor, rotor terminals are available. Many speed control techniques have been developed because of this facility. One among them is Slip power recovery scheme in which the slip power is recovered and given back to supply. However, when the machine ratings are small to permit such an expensive and complex converters, it is more practicable to recover the slip energy and charge a small battery bank and use it for UPS to feed lighting other low power loads. This proposed work presents a model to use this slip power to charge a battery instead of giving it back to the supply. In this model the motor's rotor winding is connected to a rectifier via slip rings. Power from the rotor winding flows through the three phase rectifier to a switch-mode step up DC to DC converter to re-charge a bank of batteries. A dynamic model of the complete system is presented along with simulation results and hardware implementation.
人类正面临着重大问题,电力短缺是其中之一。而不是去安装新的发电厂大量使用废弃的电力可以减少问题的严重性。在任何电网中,工业都贡献了大部分负荷。在工业应用中会有巨大的功率损耗。因此,作为需求侧管理的一部分,高效安装电力回收系统将在一定程度上减少这些电力短缺。三相异步电动机的应用非常广泛,几乎所有的工业都离不开它。在滑环感应电动机,转子端子是可用的。许多速度控制技术已经发展,因为这个设施。其中一种是滑差功率恢复方案,该方案将滑差功率恢复并返回给电源。然而,当机器额定值小到允许使用如此昂贵和复杂的转换器时,回收滑差能量并为小型电池组充电并将其用于UPS为其他低功率负载供电更为可行。这项工作提出了一个模型,使用这种滑动电源给电池充电,而不是把它还给电源。在这个模型中,电机的转子绕组通过滑环连接到整流器上。来自转子绕组的电力通过三相整流器流向开关模式升压DC到DC转换器,为一组电池充电。给出了整个系统的动态模型,并给出了仿真结果和硬件实现。
{"title":"Battery charging using induction motor's Slip power","authors":"V. Sailaja, E. R. Harshan, A. Voleti, B. Reddy","doi":"10.1109/ICECCE.2014.7086657","DOIUrl":"https://doi.org/10.1109/ICECCE.2014.7086657","url":null,"abstract":"Mankind is facing major issues, power shortages is one among them. Instead of going for installations of new power houses substantial use of wastage power can reduce the intensity of the issue. Industries contribute major part of the load in any grid. There will be huge power losses in industrial applications. So, efficient installations of power recovery systems as a part of demand side management will reduce these power shortages to some extent. Almost all industries run on three phase Induction motor which is widely used. In Slip ring Induction motor, rotor terminals are available. Many speed control techniques have been developed because of this facility. One among them is Slip power recovery scheme in which the slip power is recovered and given back to supply. However, when the machine ratings are small to permit such an expensive and complex converters, it is more practicable to recover the slip energy and charge a small battery bank and use it for UPS to feed lighting other low power loads. This proposed work presents a model to use this slip power to charge a battery instead of giving it back to the supply. In this model the motor's rotor winding is connected to a rectifier via slip rings. Power from the rotor winding flows through the three phase rectifier to a switch-mode step up DC to DC converter to re-charge a bank of batteries. A dynamic model of the complete system is presented along with simulation results and hardware implementation.","PeriodicalId":223751,"journal":{"name":"2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE)","volume":"386 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134544075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance comparison of GTS mechanism enabled IEEE 802.15.4 based Wireless Sensor Networks using LAR and DYMO protocol 使用LAR和DYMO协议实现基于IEEE 802.15.4的无线传感器网络的GTS机制性能比较
P. Samundiswary, R. Surender
Wireless Sensor Networks (WSNs) are an emerging field of engineering with various applications. The motivation is due to the low power and small size sensor nodes used in the network. It has started to emerge as the next generation wireless standard for Low-Rate Wireless Personal Area Networks (LRWPAN). The IEEE 802.15.4 standard is adopted as a communication protocol for LR-WPAN which supports low data rate, less power consumption and short transmission distance. IEEE 802.15.4 is the basis for the Zigbee enabled WSNs. IEEE and ZigBee alliance have joined hands to develop a complete specification of protocol stack for 802.15.4. The Guaranteed Time Slot (GTS) mechanism provided by IEEE 802.15.4 standard allocates specific time slots to all nodes in the network and makes communication more consistent. This consistency makes the network to enhance their performance. In this paper, the performance analysis of GTS mechanism enabled IEEE 802.15.4 based wireless sensor networks using various routing protocols is done by using QualNet. Performance metrics such as packet delivery ratio, delay and packets dropped of IEEE 802.15.4 based wireless sensor networks are analysed using Location Aided Routing (LAR) protocol. Then the performance metrics are then compared with that of DYnamic MANET On-Demand (DYMO) routing protocol.
无线传感器网络(WSNs)是一个新兴的工程领域,有着广泛的应用。其动机是由于在网络中使用的低功耗和小尺寸传感器节点。它已经开始成为低速率无线个人区域网络(LRWPAN)的下一代无线标准。LR-WPAN采用IEEE 802.15.4标准作为通信协议,具有数据速率低、功耗小、传输距离短等优点。IEEE 802.15.4是支持Zigbee的wsn的基础。IEEE和ZigBee联盟将携手开发802.15.4协议栈的完整规范。IEEE 802.15.4标准提供的GTS (Guaranteed Time Slot)机制为网络中的所有节点分配特定的时隙,使通信更加一致。这种一致性使得网络的性能得到提升。本文利用QualNet对基于GTS机制的IEEE 802.15.4无线传感器网络在不同路由协议下的性能进行了分析。利用定位辅助路由(Location Aided Routing, LAR)协议,分析了基于IEEE 802.15.4的无线传感器网络的数据包传送率、延迟和丢包等性能指标。然后将其性能指标与DYMO (DYnamic MANET On-Demand)路由协议进行了比较。
{"title":"Performance comparison of GTS mechanism enabled IEEE 802.15.4 based Wireless Sensor Networks using LAR and DYMO protocol","authors":"P. Samundiswary, R. Surender","doi":"10.1109/ICECCE.2014.7086622","DOIUrl":"https://doi.org/10.1109/ICECCE.2014.7086622","url":null,"abstract":"Wireless Sensor Networks (WSNs) are an emerging field of engineering with various applications. The motivation is due to the low power and small size sensor nodes used in the network. It has started to emerge as the next generation wireless standard for Low-Rate Wireless Personal Area Networks (LRWPAN). The IEEE 802.15.4 standard is adopted as a communication protocol for LR-WPAN which supports low data rate, less power consumption and short transmission distance. IEEE 802.15.4 is the basis for the Zigbee enabled WSNs. IEEE and ZigBee alliance have joined hands to develop a complete specification of protocol stack for 802.15.4. The Guaranteed Time Slot (GTS) mechanism provided by IEEE 802.15.4 standard allocates specific time slots to all nodes in the network and makes communication more consistent. This consistency makes the network to enhance their performance. In this paper, the performance analysis of GTS mechanism enabled IEEE 802.15.4 based wireless sensor networks using various routing protocols is done by using QualNet. Performance metrics such as packet delivery ratio, delay and packets dropped of IEEE 802.15.4 based wireless sensor networks are analysed using Location Aided Routing (LAR) protocol. Then the performance metrics are then compared with that of DYnamic MANET On-Demand (DYMO) routing protocol.","PeriodicalId":223751,"journal":{"name":"2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114065066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Efficient VLSI architecture for FIR filter using DA-RNS 采用DA-RNS的FIR滤波器的高效VLSI结构
R. Kamal, P. Chandravanshi, N. Jain, Rajkumar
In this paper, an efficient multiplier less finite impulse response (FIR) filter architecture based on distributed arithmetic (DA) using high speed residue number system (RNS) is presented. The proposed architecture uses RNS and parallel DA to increase the speed of the system. The proposed architecture is coded in VHDL and synthesized using Synopsys Design Compiler using SAED 90nm CMOS library to calculate area and delay. Synthesis results show that, the proposed structure using DA-RNS has 77.93% less area-delay-product (ADP) than the design proposed by Chan Hua Vun.
提出了一种基于高速剩余数系统(RNS)的高效无乘法器有限脉冲响应(FIR)滤波器结构。该架构采用RNS和并行数据处理来提高系统的运行速度。该架构采用VHDL编码,并使用Synopsys设计编译器合成,采用SAED 90nm CMOS库计算面积和延迟。综合结果表明,采用DA-RNS设计的结构比陈华云设计的结构面积延迟积(ADP)降低77.93%。
{"title":"Efficient VLSI architecture for FIR filter using DA-RNS","authors":"R. Kamal, P. Chandravanshi, N. Jain, Rajkumar","doi":"10.1109/ICECCE.2014.7086656","DOIUrl":"https://doi.org/10.1109/ICECCE.2014.7086656","url":null,"abstract":"In this paper, an efficient multiplier less finite impulse response (FIR) filter architecture based on distributed arithmetic (DA) using high speed residue number system (RNS) is presented. The proposed architecture uses RNS and parallel DA to increase the speed of the system. The proposed architecture is coded in VHDL and synthesized using Synopsys Design Compiler using SAED 90nm CMOS library to calculate area and delay. Synthesis results show that, the proposed structure using DA-RNS has 77.93% less area-delay-product (ADP) than the design proposed by Chan Hua Vun.","PeriodicalId":223751,"journal":{"name":"2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131645011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Investigations on Classification Algorithms for Intrusion Detection System in MANETS MANETS入侵检测系统分类算法研究
K. Anusha, D. Ezhilmaran
Intrusion Detection System is software based monitoring mechanism for a computer network that detects presence of malevolent activity in the network. Intrusion detection is an eminent upcoming area in relevance as more and more complex data is being stored and processed in networked systems. This paper focuses on investigations of well-known machine learning techniques to address the security issues in the MANET networks which are used for detection and classification of attacks: Intuitionistic fuzzy, genetic algorithm RVM (Relevance Vector Machine), and neural network algorithm. Machine Learning techniques can learn normal and anomalous patterns from training data and generate classifiers that then are used to detect attacks on computer systems. The selected attributes were applied to Data Mining Classification Algorithms which helps in bringing out the best and effective Algorithm by making use of the error rates, false positive and packet drop rates.
入侵检测系统是一种基于软件的计算机网络监控机制,用于检测网络中是否存在恶意活动。随着网络系统中存储和处理的数据越来越复杂,入侵检测是一个新兴的相关领域。本文重点研究了著名的机器学习技术,以解决用于检测和分类攻击的MANET网络中的安全问题:直觉模糊,遗传算法RVM(相关向量机)和神经网络算法。机器学习技术可以从训练数据中学习正常和异常模式,并生成分类器,然后用于检测对计算机系统的攻击。将选择的属性应用到数据挖掘分类算法中,利用错误率、误报率和丢包率,得出最优、最有效的算法。
{"title":"Investigations on Classification Algorithms for Intrusion Detection System in MANETS","authors":"K. Anusha, D. Ezhilmaran","doi":"10.1109/ICECCE.2014.7086615","DOIUrl":"https://doi.org/10.1109/ICECCE.2014.7086615","url":null,"abstract":"Intrusion Detection System is software based monitoring mechanism for a computer network that detects presence of malevolent activity in the network. Intrusion detection is an eminent upcoming area in relevance as more and more complex data is being stored and processed in networked systems. This paper focuses on investigations of well-known machine learning techniques to address the security issues in the MANET networks which are used for detection and classification of attacks: Intuitionistic fuzzy, genetic algorithm RVM (Relevance Vector Machine), and neural network algorithm. Machine Learning techniques can learn normal and anomalous patterns from training data and generate classifiers that then are used to detect attacks on computer systems. The selected attributes were applied to Data Mining Classification Algorithms which helps in bringing out the best and effective Algorithm by making use of the error rates, false positive and packet drop rates.","PeriodicalId":223751,"journal":{"name":"2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE)","volume":" 19","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132041794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A comparative survey of Symmetric and Asymmetric Key Cryptography 对称与非对称密钥加密的比较研究
Sourabh Chandra, Smita Paira, S. S. Alam, G. Sanyal
Network security is an important aspect of information sharing. Attempts have been made to remove various insecurities over internet. For this, many technological implementations and security policies have been developed. The amount of data, transferred, is not a factor. The basic factor is, how much security, the channel provides while transmitting data. Cryptography is one such technique, which allows secure data transmission without losing its confidentiality and integrity. Based on the key distribution, cryptography is further classified into two major types-Symmetric Key Cryptography and Asymmetric Key Cryptography. In this paper, we have surveyed the traditional algorithms, along with the proposed algorithms based on their pros and cons, related to Symmetric and Asymmetric Key Cryptography. We have also compared the importance of both these cryptographic techniques. The proposed algorithms proved to be highly efficient in their respective grounds but there are certain areas that remained open, related to these algorithms, and have not yet been thoroughly discussed. This paper also presents an appropriate future scope related to these open fields.
网络安全是信息共享的一个重要方面。人们试图消除对互联网的各种不安全感。为此,开发了许多技术实现和安全策略。传输的数据量不是一个因素。最基本的因素是,信道在传输数据时提供了多少安全性。密码学就是这样一种技术,它允许安全的数据传输而不会失去其机密性和完整性。根据密钥的分布,密码学可以进一步分为对称密钥密码学和非对称密钥密码学两大类。在本文中,我们调查了与对称和非对称密钥加密相关的传统算法,以及基于它们的优缺点提出的算法。我们还比较了这两种加密技术的重要性。所提出的算法在各自的基础上被证明是高效的,但与这些算法相关的某些领域仍然是开放的,并且尚未得到彻底的讨论。本文还提出了与这些开放领域相关的适当的未来范围。
{"title":"A comparative survey of Symmetric and Asymmetric Key Cryptography","authors":"Sourabh Chandra, Smita Paira, S. S. Alam, G. Sanyal","doi":"10.1109/ICECCE.2014.7086640","DOIUrl":"https://doi.org/10.1109/ICECCE.2014.7086640","url":null,"abstract":"Network security is an important aspect of information sharing. Attempts have been made to remove various insecurities over internet. For this, many technological implementations and security policies have been developed. The amount of data, transferred, is not a factor. The basic factor is, how much security, the channel provides while transmitting data. Cryptography is one such technique, which allows secure data transmission without losing its confidentiality and integrity. Based on the key distribution, cryptography is further classified into two major types-Symmetric Key Cryptography and Asymmetric Key Cryptography. In this paper, we have surveyed the traditional algorithms, along with the proposed algorithms based on their pros and cons, related to Symmetric and Asymmetric Key Cryptography. We have also compared the importance of both these cryptographic techniques. The proposed algorithms proved to be highly efficient in their respective grounds but there are certain areas that remained open, related to these algorithms, and have not yet been thoroughly discussed. This paper also presents an appropriate future scope related to these open fields.","PeriodicalId":223751,"journal":{"name":"2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128777751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 154
期刊
2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1