Journal article Open Access
B. Reddaiah
{ "inLanguage": { "alternateName": "eng", "@type": "Language", "name": "English" }, "about": [ { "@id": "", "@type": "CreativeWork" }, { "@id": "https://hdl.handle.net/B3296129219/2019\u00a9BEIESP", "@type": "CreativeWork" } ], "description": "<p>As technology is growing faster and exchanging of data is mostly carried through internet different mechanisms are being developed to counter unwanted access to the data. By introducing the web and pay out programs, it becomes very difficult to protect the data even with more mechanisms. It is becoming a big concern and worry in securing individuals data. These types of problems can be solved with cryptography and data can be secured in the network. In developing security systems Genetic algorithms are playing important role. In this proposed work crossover function from Genetic algorithms along with bitwise logical operations are used together to build a hybrid cryptosystem.</p>", "license": "https://creativecommons.org/licenses/by/4.0/legalcode", "creator": [ { "affiliation": "Yogi Vemana University, Kadapa, Andhra Pradesh, India.", "@type": "Person", "name": "B. Reddaiah" } ], "headline": "Cryptosystem using Crossover Function and Logical Operators", "image": "https://zenodo.org/static/img/logos/zenodo-gradient-round.svg", "datePublished": "2019-12-30", "keywords": [ "Security mechanisms, Security attack, Encryption, Decryption, Genetic algorithms, Crossover Function" ], "url": "https://zenodo.org/record/5596365", "contributor": [ { "affiliation": "Publisher", "@type": "Person", "name": "Blue Eyes Intelligence Engineering & Sciences Publication (BEIESP)" } ], "@context": "https://schema.org/", "identifier": "https://doi.org/10.35940/ijeat.B3296.129219", "@id": "https://doi.org/10.35940/ijeat.B3296.129219", "@type": "ScholarlyArticle", "name": "Cryptosystem using Crossover Function and Logical Operators" }
Views | 17 |
Downloads | 19 |
Data volume | 13.8 MB |
Unique views | 17 |
Unique downloads | 19 |