scispace - formally typeset
Search or ask a question
Institution

KCG College of Technology

About: KCG College of Technology is a based out in . It is known for research contribution in the topics: Computer science & The Internet. The organization has 427 authors who have published 381 publications receiving 2193 citations.


Papers
More filters
Book ChapterDOI
01 Jan 2020
TL;DR: In order to increase security and confidentiality, author generates the new group key via Email using Diffie-Hellman algorithm using email address generator in case of a new user is added or an existing user leaves themselves from the group.
Abstract: Cloud computing is the recent technology used to share and store the computer resources rather than having resources in local server to maintain the application. Though cloud is used for a large amount of storage, there is no security in cloud. In general, all the groups have data owners and data members each should have user name, key, and group key. If a user shifts from one group to another, they can easily access the information from another group. It leads to a security problem. In order to increase security and confidentiality, author generates the new group key via Email using Diffie-Hellman algorithm. In case of a new user is added or an existing user leaves themselves from the group. The data members have to get permission from the data owners in case of any data updation. If the user misbehaves, i.e., (DDOS) attack, data owner or cloud terminates the user from the group. The updated key is sent to the users through Email. This mechanism significantly improves security in cloud computing.

5 citations

31 Dec 2013
TL;DR: A dynamic S-box is generated that is dependent on the key to make up the weakness of the existing S-boxes, andrete logarithmic approach is used to improve non-linearity of the S- box.
Abstract: Generation of Dynamic S-Box Using Irreduceable Polynomial and the Secret Key Used Advanced Encryption Standard (AES) is one of the best cryptographic algorithms that can be used to protect electronic data. Its security has attracted cryptographist’s attentions. The result of new attack methods shows that there may be some lacuna in the design of S-box and key schedule with AES algorithm. The principal weakness in the AES algorithm is the problem of linearity in the S-box. In order to keep away from the new attacks and implement the AES for secure communication, a detailed analysis on the design of S-box is carried out and a new implementation scheme for increasing the complexity of S-box is designed by applying nonlinear transformations. For each composite field constructions, there exist eight possible isomorphic mappings. After the exploitation of a new common sub-expression elimination algorithm, the isomorphic mapping that results in the minimal implementation cost is chosen. S-box is the only component to implement nonlinear transformation in AES. The cryptographic strength of the AES depends strongly on the choice of Sbox. The S-box used in the traditional AES has the properties of short periods and bad distribution. In order to make up the weakness of the existing S-box we generate a dynamic S-box that is dependent on the key. Discrete logarithmic approach is used to improve non-linearity of the S-box. Also, Walsh Hadamard transform matrix is used to decide on the strength of the key and to find the most non-linear key.

5 citations

Proceedings ArticleDOI
30 Jul 2021
TL;DR: In this paper, a Naive Bayesian classifier was used to classify spam messages from the consistent messages or emails using a supervised machine learning algorithm, which is one of the familiar methods of spam classification because of its efficiency and simplicity.
Abstract: Spam is one of the major problems around the world today. To resolve this problem, different spam filtering techniques and approaches were used. in our proposed system, we are using a Naive Bayesian classifier, a content-based technique for classifying the spam from the consistent messages or emails using a Supervised Machine learning algorithm. Naive Bayesian is one of the familiar methods of spam classification because of its efficiency and simplicity. This application will detect the message as Spam or not spam and convey the result to the user.

5 citations

Book ChapterDOI
06 Dec 2018
TL;DR: Alphabets and numeric together called Alpha/Numeric microstrip patch antenna (MPA) is fabricated and tested for 2.4 GHz resonant frequency for Wi-Fi applications and the different characteristics such as return loss and VSWR were analyzed and discussed here.
Abstract: In this contribution, alphabets and numeric together called Alpha/Numeric microstrip patch antenna (MPA) is fabricated and tested for 2.4 GHz resonant frequency for Wi-Fi applications. The MPA is preferred for this design because it has the advantage that cut resonant slot inside the patch of different geometry. The Antenna is designed with Flame Retardant 4 (FR4) substrate material with a relative permittivity of 4.4 and with the suitable dimensions of substrate thickness of 1.5 mm, layout layer thickness of 70 μm, height 70 mm and width 60 mm. The above-designed antenna is fabricated (Alpha/Numeric MPA) and tested by network analyzer (E5062A ENA Series). The different characteristics such as return loss and VSWR were analyzed and discussed here.

5 citations


Authors

Showing all 427 results

NameH-indexPapersCitations
G. Nagarajan462757004
Raghavan Murugan331263838
B. Nagalingam22292255
G. V. Uma201081357
V. Edwin Geo18631023
R. Lakshmipathy1230442
Sellappan Palaniappan1129803
M. Kannan1028309
B. Vidhya1046399
S. Ramesh948503
R. Gladwin Pradeep921190
T. Ravi823153
K. Vijayaraja815133
C. Clement Raj78212
Maya Joby712309
Network Information
Related Institutions (5)
Amrita Vishwa Vidyapeetham
11K papers, 76.1K citations

79% related

National Institute of Technology, Rourkela
10.7K papers, 150.1K citations

78% related

Thapar University
8.5K papers, 130.3K citations

77% related

National Institute of Technology, Karnataka
7K papers, 70.3K citations

77% related

National Institute of Technology, Tiruchirappalli
8K papers, 111.9K citations

77% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20221
2021102
202039
201957
201839
201741