In:
International Journal of Innovative Technology and Exploring Engineering, Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP, Vol. 8, No. 10 ( 2019-08-30), p. 2273-2279
Abstract:
Now-a-days in the era of Big Data huge information is gathered in every second. Humans are now already interconnected via smart phones, gadgets, smart meters and other smart appliances. Also all these computing devices are fully connected to each other and this is known as “Internet of Things” which produces crucial information in every moment. These sensitive information needs to be protected. So, design of a good security mechanism is needed to provide protection against unauthorized attacks on this information. This article mainly takes cryptography and graph as a tool and concentrated on designing two public key encryption scheme based on graph where the first protocol is based on properties of matrices generated from graph. The aim is to protect the message graph generated from a given message. The second protocol is based on the properties of graphical codes.
Type of Medium:
Online Resource
ISSN:
2278-3075
DOI:
10.35940/ijitee.J1133.0881019
Language:
Unknown
Publisher:
Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP
Publication Date:
2019
detail.hit.zdb_id:
2750974-6
Permalink