Mechanisms for Secure Data Transmission: A Survey
B. Jyoshna1
Section:Review Paper, Product Type: Journal Paper
Volume-2 ,
Issue-8 , Page no. 82-83, Aug-2014
Online published on Aug 31, 2014
Copyright © B. Jyoshna . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: B. Jyoshna, “Mechanisms for Secure Data Transmission: A Survey,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.8, pp.82-83, 2014.
MLA Style Citation: B. Jyoshna "Mechanisms for Secure Data Transmission: A Survey." International Journal of Computer Sciences and Engineering 2.8 (2014): 82-83.
APA Style Citation: B. Jyoshna, (2014). Mechanisms for Secure Data Transmission: A Survey. International Journal of Computer Sciences and Engineering, 2(8), 82-83.
BibTex Style Citation:
@article{Jyoshna_2014,
author = {B. Jyoshna},
title = {Mechanisms for Secure Data Transmission: A Survey},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {8 2014},
volume = {2},
Issue = {8},
month = {8},
year = {2014},
issn = {2347-2693},
pages = {82-83},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=231},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=231
TI - Mechanisms for Secure Data Transmission: A Survey
T2 - International Journal of Computer Sciences and Engineering
AU - B. Jyoshna
PY - 2014
DA - 2014/08/31
PB - IJCSE, Indore, INDIA
SP - 82-83
IS - 8
VL - 2
SN - 2347-2693
ER -
VIEWS | XML | |
3554 | 3431 downloads | 3640 downloads |
Abstract
In today�s communications, data transmission play a vital role, but sending data in secure is crucial and important and it should free from unauthorized access. There are various possible techniques like Cryptography, Steganography, and Quantum Cryptography are available for secure transmission of data .This paper discusses some of the mechanisms for secure data transmission securely.
Key-Words / Index Term
Cryptograph; Steganography; Quantum cryptography
References
[1]. Prof. Pooja Shah , Dr. (Prof.) Subhash Desai, Prof. Amita Shah EEE: Efficiency Evaluation of Encryption Algorithms in Data Security.
[2]. MohitKumar, Abhishek Gupta, Kinjal Shah, Atul Saurabh, Pravesh Saxena, Vikas Kumar Tiwari Jaypee� Data Security Using Stegnography and Quantum Cryptography�.Network and Complex Systems, ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 2, No.2, 2012
[3].GillesVanAssche quantum cryptography and secure key distillation , Cambridge university press.
[4].http://voices.yahoo.com/comparing-symmetricasymmetric-key-encryption-6329400.html
[5].http://www.omnisecu.com/security/public-key-infrastructure/asymmetric-encryption-algorithms.php
[6].Network Security and cryptography Principles and practices by William Stallings 2nd Edition.