Journal of Engineering and Applied Sciences
Year:
2017
Volume:
12
Issue:
12 SI
Page No.
9386 - 9388
References
Amador, J.J. and R.W. Green, 2005. Symmetric key block cipher for image and text cryptography. Intl. J. Imaging Syst. Technol., 15: 178-188.
CrossRef | Direct Link | Daemen, J. and V. Rijmen, 2001. Rijndael the advanced encryption standard. Dobb’s J., 26: 137-139.
Direct Link | Pakshwar, R., V.K. Trivedi and V. Richhariya, 2013. A survey on different image encryption and decryption techniques. Intl. J. Comput. Sci. Inf. Technol., 4: 113-116.
Direct Link | Raj, R.M. and S. Anbu, 2014. Quantification of network security situational based awareness on neural networks. Asian J. Inf. Technol., 13: 755-760.
CrossRef | Direct Link | Ramesh, G. and R. Umarani, 2010. Data security in local area network based on fast encryption algorithm. Intl. J. Comput. Commun. Inf. Syst., 1: 85-90.
Ramesh, G. and R. Umarani, 2012. UR5: A novel symmetrical encryption algorithm with fast flexible and high security based on key updation. Intl. J. Adv. Res. Comput. Sci. Software Eng., 2: 16-22.
Singh, G., 2013. A study of encryption algorithms (RSA, DES, 3DES and AES) for information security. Intl. J. Comput. Appl., Vol. 67,
Stallings, W., 2007. Network Security Essentials: Applications and Standards. Pearson Education India, London, UK., ISBN-13: 9788131716649, Pages: 432.