Loading…
Approach towards Optimum Data Transfer with Various Automatic Variable Key (AVK) Techniques to Achieve Perfect Security with Analysis and Comparison
Session to session key variation is the only approach for achieving perfect security as per Shannon [1-2]. This paper deals with time variant key technique Automatic Variable Key (AVK) introduced by Bhunia[3-5] and we tried to analyze the performance of different types of new AVK techniques.
Saved in:
Published in: | International journal of computer applications 2013-01, Vol.82 (1), p.28-32 |
---|---|
Main Authors: | , , , |
Format: | Article |
Language: | English |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 32 |
container_issue | 1 |
container_start_page | 28 |
container_title | International journal of computer applications |
container_volume | 82 |
creator | Goswami, Rajat S Chakraborty, Swarnendu K Bhunia, Abhinandan Bhunia, Chandan T |
description | Session to session key variation is the only approach for achieving perfect security as per Shannon [1-2]. This paper deals with time variant key technique Automatic Variable Key (AVK) introduced by Bhunia[3-5] and we tried to analyze the performance of different types of new AVK techniques. |
doi_str_mv | 10.5120/14081-2078 |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1475537473</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1475537473</sourcerecordid><originalsourceid>FETCH-LOGICAL-c1328-49d9fa3add713995c04cf6ed6affec708358f8f2d6d5064e770bf99bd98382b03</originalsourceid><addsrcrecordid>eNpdkctKAzEUhgdRsNRufIKAmyqMZiaTSbIc6hULFazdDmkuNGVuJhnLvIcPbNq6EM_mHA4f_7n8UXSZwFucpPAuySBN4hQSehKNICM4ppSS0z_1eTRxbgtDIJbmLBtF30XX2ZaLDfDtjlvpwKLzpu5rcM89B0vLG6eVBTvjN2DFrWl7B4retzX3Rhw6fF0p8KoGMC1Wr9dgqcSmMZ-9ckESFGJj1JcCb8pqJTx4V6K3xg9HwaLh1eCMA7yRYNbWXZBzbXMRnWleOTX5zePo4_FhOXuO54unl1kxj0WCUhpnTDLNEZeSJIgxLGAmdK5kznWYRSBFmGqqU5lLDPNMEQLXmrG1ZBTRdA3ROJoedcML9gv7sjZOqKrijQp3lklGMEYkIyigV__QbdvbsP6ewiwL_8dpoG6OlLCtc1bpsrOm5nYoE1juPSoPHpV7j9AP6Y2EOA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1459412052</pqid></control><display><type>article</type><title>Approach towards Optimum Data Transfer with Various Automatic Variable Key (AVK) Techniques to Achieve Perfect Security with Analysis and Comparison</title><source>Freely Accessible Science Journals</source><creator>Goswami, Rajat S ; Chakraborty, Swarnendu K ; Bhunia, Abhinandan ; Bhunia, Chandan T</creator><creatorcontrib>Goswami, Rajat S ; Chakraborty, Swarnendu K ; Bhunia, Abhinandan ; Bhunia, Chandan T</creatorcontrib><description>Session to session key variation is the only approach for achieving perfect security as per Shannon [1-2]. This paper deals with time variant key technique Automatic Variable Key (AVK) introduced by Bhunia[3-5] and we tried to analyze the performance of different types of new AVK techniques.</description><identifier>ISSN: 0975-8887</identifier><identifier>EISSN: 0975-8887</identifier><identifier>DOI: 10.5120/14081-2078</identifier><language>eng</language><publisher>New York: Foundation of Computer Science</publisher><subject>Computer information security</subject><ispartof>International journal of computer applications, 2013-01, Vol.82 (1), p.28-32</ispartof><rights>Copyright Foundation of Computer Science 2013</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Goswami, Rajat S</creatorcontrib><creatorcontrib>Chakraborty, Swarnendu K</creatorcontrib><creatorcontrib>Bhunia, Abhinandan</creatorcontrib><creatorcontrib>Bhunia, Chandan T</creatorcontrib><title>Approach towards Optimum Data Transfer with Various Automatic Variable Key (AVK) Techniques to Achieve Perfect Security with Analysis and Comparison</title><title>International journal of computer applications</title><description>Session to session key variation is the only approach for achieving perfect security as per Shannon [1-2]. This paper deals with time variant key technique Automatic Variable Key (AVK) introduced by Bhunia[3-5] and we tried to analyze the performance of different types of new AVK techniques.</description><subject>Computer information security</subject><issn>0975-8887</issn><issn>0975-8887</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2013</creationdate><recordtype>article</recordtype><recordid>eNpdkctKAzEUhgdRsNRufIKAmyqMZiaTSbIc6hULFazdDmkuNGVuJhnLvIcPbNq6EM_mHA4f_7n8UXSZwFucpPAuySBN4hQSehKNICM4ppSS0z_1eTRxbgtDIJbmLBtF30XX2ZaLDfDtjlvpwKLzpu5rcM89B0vLG6eVBTvjN2DFrWl7B4retzX3Rhw6fF0p8KoGMC1Wr9dgqcSmMZ-9ckESFGJj1JcCb8pqJTx4V6K3xg9HwaLh1eCMA7yRYNbWXZBzbXMRnWleOTX5zePo4_FhOXuO54unl1kxj0WCUhpnTDLNEZeSJIgxLGAmdK5kznWYRSBFmGqqU5lLDPNMEQLXmrG1ZBTRdA3ROJoedcML9gv7sjZOqKrijQp3lklGMEYkIyigV__QbdvbsP6ewiwL_8dpoG6OlLCtc1bpsrOm5nYoE1juPSoPHpV7j9AP6Y2EOA</recordid><startdate>20130101</startdate><enddate>20130101</enddate><creator>Goswami, Rajat S</creator><creator>Chakraborty, Swarnendu K</creator><creator>Bhunia, Abhinandan</creator><creator>Bhunia, Chandan T</creator><general>Foundation of Computer Science</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20130101</creationdate><title>Approach towards Optimum Data Transfer with Various Automatic Variable Key (AVK) Techniques to Achieve Perfect Security with Analysis and Comparison</title><author>Goswami, Rajat S ; Chakraborty, Swarnendu K ; Bhunia, Abhinandan ; Bhunia, Chandan T</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c1328-49d9fa3add713995c04cf6ed6affec708358f8f2d6d5064e770bf99bd98382b03</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2013</creationdate><topic>Computer information security</topic><toplevel>online_resources</toplevel><creatorcontrib>Goswami, Rajat S</creatorcontrib><creatorcontrib>Chakraborty, Swarnendu K</creatorcontrib><creatorcontrib>Bhunia, Abhinandan</creatorcontrib><creatorcontrib>Bhunia, Chandan T</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>International journal of computer applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Goswami, Rajat S</au><au>Chakraborty, Swarnendu K</au><au>Bhunia, Abhinandan</au><au>Bhunia, Chandan T</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Approach towards Optimum Data Transfer with Various Automatic Variable Key (AVK) Techniques to Achieve Perfect Security with Analysis and Comparison</atitle><jtitle>International journal of computer applications</jtitle><date>2013-01-01</date><risdate>2013</risdate><volume>82</volume><issue>1</issue><spage>28</spage><epage>32</epage><pages>28-32</pages><issn>0975-8887</issn><eissn>0975-8887</eissn><abstract>Session to session key variation is the only approach for achieving perfect security as per Shannon [1-2]. This paper deals with time variant key technique Automatic Variable Key (AVK) introduced by Bhunia[3-5] and we tried to analyze the performance of different types of new AVK techniques.</abstract><cop>New York</cop><pub>Foundation of Computer Science</pub><doi>10.5120/14081-2078</doi><tpages>5</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0975-8887 |
ispartof | International journal of computer applications, 2013-01, Vol.82 (1), p.28-32 |
issn | 0975-8887 0975-8887 |
language | eng |
recordid | cdi_proquest_miscellaneous_1475537473 |
source | Freely Accessible Science Journals |
subjects | Computer information security |
title | Approach towards Optimum Data Transfer with Various Automatic Variable Key (AVK) Techniques to Achieve Perfect Security with Analysis and Comparison |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T17%3A33%3A16IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Approach%20towards%20Optimum%20Data%20Transfer%20with%20Various%20Automatic%20Variable%20Key%20(AVK)%20Techniques%20to%20Achieve%20Perfect%20Security%20with%20Analysis%20and%20Comparison&rft.jtitle=International%20journal%20of%20computer%20applications&rft.au=Goswami,%20Rajat%20S&rft.date=2013-01-01&rft.volume=82&rft.issue=1&rft.spage=28&rft.epage=32&rft.pages=28-32&rft.issn=0975-8887&rft.eissn=0975-8887&rft_id=info:doi/10.5120/14081-2078&rft_dat=%3Cproquest_cross%3E1475537473%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c1328-49d9fa3add713995c04cf6ed6affec708358f8f2d6d5064e770bf99bd98382b03%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=1459412052&rft_id=info:pmid/&rfr_iscdi=true |