Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/530140
Full metadata record
DC FieldValueLanguage
dc.coverage.spatial
dc.date.accessioned2023-12-16T10:11:32Z-
dc.date.available2023-12-16T10:11:32Z-
dc.identifier.urihttp://hdl.handle.net/10603/530140-
dc.description.abstractWe live in a world that is digitalized and the adoption of the digital route even for newlinefields that were reluctant to move out of the traditional way have widened boundaries and newlinehas made quality service available for a larger community of people. Today, we can newlinereside from India and take medical guidance from a doctor from any part of the world and newlinelarge part of this is due to the digitalization of our lives. We are happy to share our most newlineconfidential work such as intellectual property or an academic project or a copyrighted newlinephotograph or a motion picture via mail or through other mediums and digital signatures newlinehave made even signing of key documents, digital. Can we imagine, buying a property or newlineany other valuable with a digital signature, 10 years ago? newlineAs life has moved on to the digital space and most of us have a mobile gadget or a newlinecomputing device as our best partner, concerns related to the safety of our digital newlinecommunications have also increased multifold. A breakaway into a clinical database can newlineexpose the personal clinical data of millions of patients. A cracking of banking or an newlineinsurance system can leak millions of user financial data. Wiki leaks as we all are aware newlineof, has exposed some of the top communications of political leaders worldwide and has newlinethreaten to shake the equilibrium of powerful countries. As the stakes have got higher and newlinehigher and heads have rolled on account of data leaks, at the heart of this tsunami of newlinedigital activity is cryptography. newlineCryptography is not a recent phenomenon. In fact, Cryptography is as old as newlinewireless communications go or beyond. But cryptography continues to be torchbearer of newlinesecure digital transaction or communication. Various cryptographic techniques have been newlinedeveloped in the past to offer encryption and decryption of digital data. Traditional newlinecryptographic algorithms such as Data Encryption Standard (DES), Advanced Encryption newlineStandard (AES), Rivest, Shamir and Adleman (RSA), and others are based on the newlinemathematical algorithms and require a lot of computing po
dc.format.extent113
dc.languageEnglish
dc.relation
dc.rightsuniversity
dc.titleA DNA Cryptographic Framework for Secured Data Encryption Based on Chaotic Sequences
dc.title.alternative
dc.creator.researcherAkiwate, Bahubali M
dc.subject.keywordComputer Science
dc.subject.keywordComputer Science Software Engineering
dc.subject.keywordEngineering and Technology
dc.description.note
dc.contributor.guideParthiban, Latha
dc.publisher.placeBelagavi
dc.publisher.universityVisvesvaraya Technological University, Belagavi
dc.publisher.institutionDepartment of Computer Science and Engineering
dc.date.registered2015
dc.date.completed2022
dc.date.awarded2022
dc.format.dimensions
dc.format.accompanyingmaterialDVD
dc.source.universityUniversity
dc.type.degreePh.D.
Appears in Departments:Department of Computer Science and Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File168.59 kBAdobe PDFView/Open
02_prelim pages.pdf701.7 kBAdobe PDFView/Open
03_content.pdf85.89 kBAdobe PDFView/Open
04_abstract.pdf79.84 kBAdobe PDFView/Open
05_chapter 1.pdf180.95 kBAdobe PDFView/Open
06_chapter 2.pdf371.29 kBAdobe PDFView/Open
07_chapter 3.pdf1.85 MBAdobe PDFView/Open
08_chapter 4.pdf289.71 kBAdobe PDFView/Open
09_chapter 5.pdf294.31 kBAdobe PDFView/Open
10_annexures.pdf149 kBAdobe PDFView/Open
80_recommendation.pdf100.25 kBAdobe PDFView/Open


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: