Loading…

Approach towards Optimum Data Transfer with Various Automatic Variable Key (AVK) Techniques to Achieve Perfect Security with Analysis and Comparison

Session to session key variation is the only approach for achieving perfect security as per Shannon [1-2]. This paper deals with time variant key technique Automatic Variable Key (AVK) introduced by Bhunia[3-5] and we tried to analyze the performance of different types of new AVK techniques.

Saved in:
Bibliographic Details
Published in:International journal of computer applications 2013-01, Vol.82 (1), p.28-32
Main Authors: Goswami, Rajat S, Chakraborty, Swarnendu K, Bhunia, Abhinandan, Bhunia, Chandan T
Format: Article
Language:English
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 32
container_issue 1
container_start_page 28
container_title International journal of computer applications
container_volume 82
creator Goswami, Rajat S
Chakraborty, Swarnendu K
Bhunia, Abhinandan
Bhunia, Chandan T
description Session to session key variation is the only approach for achieving perfect security as per Shannon [1-2]. This paper deals with time variant key technique Automatic Variable Key (AVK) introduced by Bhunia[3-5] and we tried to analyze the performance of different types of new AVK techniques.
doi_str_mv 10.5120/14081-2078
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1475537473</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1475537473</sourcerecordid><originalsourceid>FETCH-LOGICAL-c1328-49d9fa3add713995c04cf6ed6affec708358f8f2d6d5064e770bf99bd98382b03</originalsourceid><addsrcrecordid>eNpdkctKAzEUhgdRsNRufIKAmyqMZiaTSbIc6hULFazdDmkuNGVuJhnLvIcPbNq6EM_mHA4f_7n8UXSZwFucpPAuySBN4hQSehKNICM4ppSS0z_1eTRxbgtDIJbmLBtF30XX2ZaLDfDtjlvpwKLzpu5rcM89B0vLG6eVBTvjN2DFrWl7B4retzX3Rhw6fF0p8KoGMC1Wr9dgqcSmMZ-9ckESFGJj1JcCb8pqJTx4V6K3xg9HwaLh1eCMA7yRYNbWXZBzbXMRnWleOTX5zePo4_FhOXuO54unl1kxj0WCUhpnTDLNEZeSJIgxLGAmdK5kznWYRSBFmGqqU5lLDPNMEQLXmrG1ZBTRdA3ROJoedcML9gv7sjZOqKrijQp3lklGMEYkIyigV__QbdvbsP6ewiwL_8dpoG6OlLCtc1bpsrOm5nYoE1juPSoPHpV7j9AP6Y2EOA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1459412052</pqid></control><display><type>article</type><title>Approach towards Optimum Data Transfer with Various Automatic Variable Key (AVK) Techniques to Achieve Perfect Security with Analysis and Comparison</title><source>Freely Accessible Science Journals</source><creator>Goswami, Rajat S ; Chakraborty, Swarnendu K ; Bhunia, Abhinandan ; Bhunia, Chandan T</creator><creatorcontrib>Goswami, Rajat S ; Chakraborty, Swarnendu K ; Bhunia, Abhinandan ; Bhunia, Chandan T</creatorcontrib><description>Session to session key variation is the only approach for achieving perfect security as per Shannon [1-2]. This paper deals with time variant key technique Automatic Variable Key (AVK) introduced by Bhunia[3-5] and we tried to analyze the performance of different types of new AVK techniques.</description><identifier>ISSN: 0975-8887</identifier><identifier>EISSN: 0975-8887</identifier><identifier>DOI: 10.5120/14081-2078</identifier><language>eng</language><publisher>New York: Foundation of Computer Science</publisher><subject>Computer information security</subject><ispartof>International journal of computer applications, 2013-01, Vol.82 (1), p.28-32</ispartof><rights>Copyright Foundation of Computer Science 2013</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Goswami, Rajat S</creatorcontrib><creatorcontrib>Chakraborty, Swarnendu K</creatorcontrib><creatorcontrib>Bhunia, Abhinandan</creatorcontrib><creatorcontrib>Bhunia, Chandan T</creatorcontrib><title>Approach towards Optimum Data Transfer with Various Automatic Variable Key (AVK) Techniques to Achieve Perfect Security with Analysis and Comparison</title><title>International journal of computer applications</title><description>Session to session key variation is the only approach for achieving perfect security as per Shannon [1-2]. This paper deals with time variant key technique Automatic Variable Key (AVK) introduced by Bhunia[3-5] and we tried to analyze the performance of different types of new AVK techniques.</description><subject>Computer information security</subject><issn>0975-8887</issn><issn>0975-8887</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2013</creationdate><recordtype>article</recordtype><recordid>eNpdkctKAzEUhgdRsNRufIKAmyqMZiaTSbIc6hULFazdDmkuNGVuJhnLvIcPbNq6EM_mHA4f_7n8UXSZwFucpPAuySBN4hQSehKNICM4ppSS0z_1eTRxbgtDIJbmLBtF30XX2ZaLDfDtjlvpwKLzpu5rcM89B0vLG6eVBTvjN2DFrWl7B4retzX3Rhw6fF0p8KoGMC1Wr9dgqcSmMZ-9ckESFGJj1JcCb8pqJTx4V6K3xg9HwaLh1eCMA7yRYNbWXZBzbXMRnWleOTX5zePo4_FhOXuO54unl1kxj0WCUhpnTDLNEZeSJIgxLGAmdK5kznWYRSBFmGqqU5lLDPNMEQLXmrG1ZBTRdA3ROJoedcML9gv7sjZOqKrijQp3lklGMEYkIyigV__QbdvbsP6ewiwL_8dpoG6OlLCtc1bpsrOm5nYoE1juPSoPHpV7j9AP6Y2EOA</recordid><startdate>20130101</startdate><enddate>20130101</enddate><creator>Goswami, Rajat S</creator><creator>Chakraborty, Swarnendu K</creator><creator>Bhunia, Abhinandan</creator><creator>Bhunia, Chandan T</creator><general>Foundation of Computer Science</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20130101</creationdate><title>Approach towards Optimum Data Transfer with Various Automatic Variable Key (AVK) Techniques to Achieve Perfect Security with Analysis and Comparison</title><author>Goswami, Rajat S ; Chakraborty, Swarnendu K ; Bhunia, Abhinandan ; Bhunia, Chandan T</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c1328-49d9fa3add713995c04cf6ed6affec708358f8f2d6d5064e770bf99bd98382b03</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2013</creationdate><topic>Computer information security</topic><toplevel>online_resources</toplevel><creatorcontrib>Goswami, Rajat S</creatorcontrib><creatorcontrib>Chakraborty, Swarnendu K</creatorcontrib><creatorcontrib>Bhunia, Abhinandan</creatorcontrib><creatorcontrib>Bhunia, Chandan T</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>International journal of computer applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Goswami, Rajat S</au><au>Chakraborty, Swarnendu K</au><au>Bhunia, Abhinandan</au><au>Bhunia, Chandan T</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Approach towards Optimum Data Transfer with Various Automatic Variable Key (AVK) Techniques to Achieve Perfect Security with Analysis and Comparison</atitle><jtitle>International journal of computer applications</jtitle><date>2013-01-01</date><risdate>2013</risdate><volume>82</volume><issue>1</issue><spage>28</spage><epage>32</epage><pages>28-32</pages><issn>0975-8887</issn><eissn>0975-8887</eissn><abstract>Session to session key variation is the only approach for achieving perfect security as per Shannon [1-2]. This paper deals with time variant key technique Automatic Variable Key (AVK) introduced by Bhunia[3-5] and we tried to analyze the performance of different types of new AVK techniques.</abstract><cop>New York</cop><pub>Foundation of Computer Science</pub><doi>10.5120/14081-2078</doi><tpages>5</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 0975-8887
ispartof International journal of computer applications, 2013-01, Vol.82 (1), p.28-32
issn 0975-8887
0975-8887
language eng
recordid cdi_proquest_miscellaneous_1475537473
source Freely Accessible Science Journals
subjects Computer information security
title Approach towards Optimum Data Transfer with Various Automatic Variable Key (AVK) Techniques to Achieve Perfect Security with Analysis and Comparison
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T17%3A33%3A16IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Approach%20towards%20Optimum%20Data%20Transfer%20with%20Various%20Automatic%20Variable%20Key%20(AVK)%20Techniques%20to%20Achieve%20Perfect%20Security%20with%20Analysis%20and%20Comparison&rft.jtitle=International%20journal%20of%20computer%20applications&rft.au=Goswami,%20Rajat%20S&rft.date=2013-01-01&rft.volume=82&rft.issue=1&rft.spage=28&rft.epage=32&rft.pages=28-32&rft.issn=0975-8887&rft.eissn=0975-8887&rft_id=info:doi/10.5120/14081-2078&rft_dat=%3Cproquest_cross%3E1475537473%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c1328-49d9fa3add713995c04cf6ed6affec708358f8f2d6d5064e770bf99bd98382b03%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=1459412052&rft_id=info:pmid/&rfr_iscdi=true