Open Access   Article Go Back

Key Exchange Technique in Cryptography Using Diffie-Hellman Algorithm

V. Vinothini1 , C. Muthukumaran2

Section:Research Paper, Product Type: Journal Paper
Volume-07 , Issue-04 , Page no. 151-152, Feb-2019

Online published on Feb 28, 2019

Copyright © V. Vinothini, C. Muthukumaran . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: V. Vinothini, C. Muthukumaran, “Key Exchange Technique in Cryptography Using Diffie-Hellman Algorithm,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.04, pp.151-152, 2019.

MLA Style Citation: V. Vinothini, C. Muthukumaran "Key Exchange Technique in Cryptography Using Diffie-Hellman Algorithm." International Journal of Computer Sciences and Engineering 07.04 (2019): 151-152.

APA Style Citation: V. Vinothini, C. Muthukumaran, (2019). Key Exchange Technique in Cryptography Using Diffie-Hellman Algorithm. International Journal of Computer Sciences and Engineering, 07(04), 151-152.

BibTex Style Citation:
@article{Vinothini_2019,
author = {V. Vinothini, C. Muthukumaran},
title = {Key Exchange Technique in Cryptography Using Diffie-Hellman Algorithm},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2019},
volume = {07},
Issue = {04},
month = {2},
year = {2019},
issn = {2347-2693},
pages = {151-152},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=739},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=739
TI - Key Exchange Technique in Cryptography Using Diffie-Hellman Algorithm
T2 - International Journal of Computer Sciences and Engineering
AU - V. Vinothini, C. Muthukumaran
PY - 2019
DA - 2019/02/28
PB - IJCSE, Indore, INDIA
SP - 151-152
IS - 04
VL - 07
SN - 2347-2693
ER -

           

Abstract

Internet of Things is a new pattern which provides a set of new services for the next form of technological development. IOT in the sense, it is a “universal global neural network” in the cloud which connects various things. The form of communication that is either human-device, or human-human but the Internet of Things (IoT) promises a great future for the internet where the type of communication is machine-machine (M2M). This paper aims to provide a future vision , IoT Architecture , Applications and its Challenges.

Key-Words / Index Term

Vision, Challenges, Applications, Architecture

References

[1] Y. Amir, Y.Kim, C. Nita-Rotaru, “Secure communication using contributory key agreement”, IEEE Transactions on Parallel and Distributed systems, pp. 468-480,2009.
[2] M. Bellare, D. Pointcheval, P. Rogaway, ” Authenticated Key exchange secure against dictionary attacks”, IN Proc. Of Eurocrypt, pp. 139-155.2010
[3] S. Blakke Wilson, A. Menezes, “ Entity authentication and authenticated transport protocols employing asymmetric techniques”, SPRINGER 1997.