Papers
More filters
••
01 Jan 2020TL;DR: In order to increase security and confidentiality, author generates the new group key via Email using Diffie-Hellman algorithm using email address generator in case of a new user is added or an existing user leaves themselves from the group.
Abstract: Cloud computing is the recent technology used to share and store the computer resources rather than having resources in local server to maintain the application. Though cloud is used for a large amount of storage, there is no security in cloud. In general, all the groups have data owners and data members each should have user name, key, and group key. If a user shifts from one group to another, they can easily access the information from another group. It leads to a security problem. In order to increase security and confidentiality, author generates the new group key via Email using Diffie-Hellman algorithm. In case of a new user is added or an existing user leaves themselves from the group. The data members have to get permission from the data owners in case of any data updation. If the user misbehaves, i.e., (DDOS) attack, data owner or cloud terminates the user from the group. The updated key is sent to the users through Email. This mechanism significantly improves security in cloud computing.
5 citations
31 Dec 2013
TL;DR: A dynamic S-box is generated that is dependent on the key to make up the weakness of the existing S-boxes, andrete logarithmic approach is used to improve non-linearity of the S- box.
Abstract: Generation of Dynamic S-Box Using Irreduceable Polynomial and the Secret Key Used
Advanced Encryption Standard (AES) is one of the best cryptographic algorithms that can be used to protect electronic data. Its security has attracted cryptographist’s attentions. The result of new attack methods shows that there may be some lacuna in the design of S-box and key schedule with AES algorithm. The principal weakness in the AES algorithm is the problem of linearity in the S-box. In order to keep away from the new attacks and implement the AES for secure communication, a detailed analysis on the design of S-box is carried out and a new implementation scheme for increasing the complexity of S-box is designed by applying nonlinear transformations. For each composite field constructions, there exist eight possible isomorphic mappings. After the exploitation of a new common sub-expression elimination algorithm, the isomorphic mapping that results in the minimal implementation cost is chosen. S-box is the only component to implement nonlinear transformation in AES. The cryptographic strength of the AES depends strongly on the choice of Sbox. The S-box used in the traditional AES has the properties of short periods and bad distribution. In order to make up the weakness of the existing S-box we generate a dynamic S-box that is dependent on the key. Discrete logarithmic approach is used to improve non-linearity of the S-box. Also, Walsh Hadamard transform matrix is used to decide on the strength of the key and to find the most non-linear key.
5 citations
••
30 Jul 2021TL;DR: In this paper, a Naive Bayesian classifier was used to classify spam messages from the consistent messages or emails using a supervised machine learning algorithm, which is one of the familiar methods of spam classification because of its efficiency and simplicity.
Abstract: Spam is one of the major problems around the world today. To resolve this problem, different spam filtering techniques and approaches were used. in our proposed system, we are using a Naive Bayesian classifier, a content-based technique for classifying the spam from the consistent messages or emails using a Supervised Machine learning algorithm. Naive Bayesian is one of the familiar methods of spam classification because of its efficiency and simplicity. This application will detect the message as Spam or not spam and convey the result to the user.
5 citations
••
5 citations
••
06 Dec 2018TL;DR: Alphabets and numeric together called Alpha/Numeric microstrip patch antenna (MPA) is fabricated and tested for 2.4 GHz resonant frequency for Wi-Fi applications and the different characteristics such as return loss and VSWR were analyzed and discussed here.
Abstract: In this contribution, alphabets and numeric together called Alpha/Numeric microstrip patch antenna (MPA) is fabricated and tested for 2.4 GHz resonant frequency for Wi-Fi applications. The MPA is preferred for this design because it has the advantage that cut resonant slot inside the patch of different geometry. The Antenna is designed with Flame Retardant 4 (FR4) substrate material with a relative permittivity of 4.4 and with the suitable dimensions of substrate thickness of 1.5 mm, layout layer thickness of 70 μm, height 70 mm and width 60 mm. The above-designed antenna is fabricated (Alpha/Numeric MPA) and tested by network analyzer (E5062A ENA Series). The different characteristics such as return loss and VSWR were analyzed and discussed here.
5 citations
Authors
Showing all 427 results
Name | H-index | Papers | Citations |
---|---|---|---|
G. Nagarajan | 46 | 275 | 7004 |
Raghavan Murugan | 33 | 126 | 3838 |
B. Nagalingam | 22 | 29 | 2255 |
G. V. Uma | 20 | 108 | 1357 |
V. Edwin Geo | 18 | 63 | 1023 |
R. Lakshmipathy | 12 | 30 | 442 |
Sellappan Palaniappan | 11 | 29 | 803 |
M. Kannan | 10 | 28 | 309 |
B. Vidhya | 10 | 46 | 399 |
S. Ramesh | 9 | 48 | 503 |
R. Gladwin Pradeep | 9 | 21 | 190 |
T. Ravi | 8 | 23 | 153 |
K. Vijayaraja | 8 | 15 | 133 |
C. Clement Raj | 7 | 8 | 212 |
Maya Joby | 7 | 12 | 309 |