Please use this identifier to cite or link to this item: https://gnanaganga.inflibnet.ac.in:8443/jspui/handle/123456789/15643
Full metadata record
DC FieldValueLanguage
dc.contributor.authorDevi, Supriya-
dc.contributor.authorVinay Kumar, H S-
dc.date.accessioned2024-05-29T08:51:26Z-
dc.date.available2024-05-29T08:51:26Z-
dc.date.issued2024-
dc.identifier.isbn9798350343670-
dc.identifier.urihttp://dx.doi.org/10.1109/ICAECT60202.2024.10469087-
dc.identifier.urihttp://gnanaganga.inflibnet.ac.in:8080/jspui/handle/123456789/15643-
dc.description.abstractInformation about encryption and a dozen practical importance of it can be visualized in the last three decades due to the development in the field of computer science data resource and Internet sharing. Re-visiting the concept says in short sentences, to convert your given information to a different source format which is only recognized or repacked by its required receiver. This research paper is about a simple encryption that can be made using elementary programming languages rather than any other official encryption methods on the internet which indeed are hard and require large steps to understand. This algorithm can be used when the device could be customized or old enough to access communication services like email but, not a communication application because any access through them while using the internet is usually universally programmed and implemented which could be traceable in the end by an unknown source or program. The main aim of the program is to implement through offline and send the encrypted data totally programmed manually for cyber security applications. © 2024 IEEE.en_US
dc.language.isoenen_US
dc.publisher4th International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies, ICAECT 2024en_US
dc.publisherInstitute of Electrical and Electronics Engineers Inc.en_US
dc.subjectAccount Loginen_US
dc.subjectBinary Algorithmen_US
dc.subjectDecryptionen_US
dc.subjectEasyen_US
dc.subjectEncryptionen_US
dc.subjectInternet Redundancyen_US
dc.subjectProgrammableen_US
dc.subjectProtectionen_US
dc.subjectSimpleen_US
dc.subjectSupercomputeren_US
dc.titleSimple Encryption and Decryption of Password for Cyber Security Applicationen_US
dc.typeArticleen_US
Appears in Collections:Conference Papers

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.