Open Access   Article Go Back

Mechanisms for Secure Data Transmission: A Survey

B. Jyoshna1

Section:Review Paper, Product Type: Journal Paper
Volume-2 , Issue-8 , Page no. 82-83, Aug-2014

Online published on Aug 31, 2014

Copyright © B. Jyoshna . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: B. Jyoshna, “Mechanisms for Secure Data Transmission: A Survey,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.8, pp.82-83, 2014.

MLA Style Citation: B. Jyoshna "Mechanisms for Secure Data Transmission: A Survey." International Journal of Computer Sciences and Engineering 2.8 (2014): 82-83.

APA Style Citation: B. Jyoshna, (2014). Mechanisms for Secure Data Transmission: A Survey. International Journal of Computer Sciences and Engineering, 2(8), 82-83.

BibTex Style Citation:
@article{Jyoshna_2014,
author = {B. Jyoshna},
title = {Mechanisms for Secure Data Transmission: A Survey},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {8 2014},
volume = {2},
Issue = {8},
month = {8},
year = {2014},
issn = {2347-2693},
pages = {82-83},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=231},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=231
TI - Mechanisms for Secure Data Transmission: A Survey
T2 - International Journal of Computer Sciences and Engineering
AU - B. Jyoshna
PY - 2014
DA - 2014/08/31
PB - IJCSE, Indore, INDIA
SP - 82-83
IS - 8
VL - 2
SN - 2347-2693
ER -

VIEWS PDF XML
3554 3431 downloads 3640 downloads
  
  
           

Abstract

In today�s communications, data transmission play a vital role, but sending data in secure is crucial and important and it should free from unauthorized access. There are various possible techniques like Cryptography, Steganography, and Quantum Cryptography are available for secure transmission of data .This paper discusses some of the mechanisms for secure data transmission securely.

Key-Words / Index Term

Cryptograph; Steganography; Quantum cryptography

References

[1]. Prof. Pooja Shah , Dr. (Prof.) Subhash Desai, Prof. Amita Shah EEE: Efficiency Evaluation of Encryption Algorithms in Data Security.
[2]. MohitKumar, Abhishek Gupta, Kinjal Shah, Atul Saurabh, Pravesh Saxena, Vikas Kumar Tiwari Jaypee� Data Security Using Stegnography and Quantum Cryptography�.Network and Complex Systems, ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 2, No.2, 2012
[3].GillesVanAssche quantum cryptography and secure key distillation , Cambridge university press.
[4].http://voices.yahoo.com/comparing-symmetricasymmetric-key-encryption-6329400.html
[5].http://www.omnisecu.com/security/public-key-infrastructure/asymmetric-encryption-algorithms.php
[6].Network Security and cryptography Principles and practices by William Stallings 2nd Edition.