Please use this identifier to cite or link to this item:
https://gnanaganga.inflibnet.ac.in:8443/jspui/handle/123456789/15643
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Devi, Supriya | - |
dc.contributor.author | Vinay Kumar, H S | - |
dc.date.accessioned | 2024-05-29T08:51:26Z | - |
dc.date.available | 2024-05-29T08:51:26Z | - |
dc.date.issued | 2024 | - |
dc.identifier.isbn | 9798350343670 | - |
dc.identifier.uri | http://dx.doi.org/10.1109/ICAECT60202.2024.10469087 | - |
dc.identifier.uri | http://gnanaganga.inflibnet.ac.in:8080/jspui/handle/123456789/15643 | - |
dc.description.abstract | Information about encryption and a dozen practical importance of it can be visualized in the last three decades due to the development in the field of computer science data resource and Internet sharing. Re-visiting the concept says in short sentences, to convert your given information to a different source format which is only recognized or repacked by its required receiver. This research paper is about a simple encryption that can be made using elementary programming languages rather than any other official encryption methods on the internet which indeed are hard and require large steps to understand. This algorithm can be used when the device could be customized or old enough to access communication services like email but, not a communication application because any access through them while using the internet is usually universally programmed and implemented which could be traceable in the end by an unknown source or program. The main aim of the program is to implement through offline and send the encrypted data totally programmed manually for cyber security applications. © 2024 IEEE. | en_US |
dc.language.iso | en | en_US |
dc.publisher | 4th International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies, ICAECT 2024 | en_US |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | en_US |
dc.subject | Account Login | en_US |
dc.subject | Binary Algorithm | en_US |
dc.subject | Decryption | en_US |
dc.subject | Easy | en_US |
dc.subject | Encryption | en_US |
dc.subject | Internet Redundancy | en_US |
dc.subject | Programmable | en_US |
dc.subject | Protection | en_US |
dc.subject | Simple | en_US |
dc.subject | Supercomputer | en_US |
dc.title | Simple Encryption and Decryption of Password for Cyber Security Application | en_US |
dc.type | Article | en_US |
Appears in Collections: | Conference Papers |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.