Volume-4 Issue-10


Version
Download 13
Total Views 164
Stock
File Size 4.00 KB
File Type unknown
Create Date May 16, 2018
Last Updated June 20, 2018
Download

Download Abstract Book

S. No

Volume-4 Issue-10, June 2018, ISSN: 2319-9598 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd.

Page No.

1.

Authors:

Aishwarya Rathod, Bhagyalaxmi Kodre, Nida Sayyed, Ronak Sayta, Lata Sankpal

Paper Title:

Implementation of Location Based Encryption for Secure Banking Transactions in Mobile Data Environment

Abstract: Security has constantly been a fundamental bit of human life. People have been hunting down physical and monetary security. With the progression of human learning and getting into the new period the need of data security were added to human security concerns. Information is encoded just when individual is having private key. In cryptography "character" part is imperative, we can utilize this part as encryption. Those are inside specific topographical zone is endorsed for information decoding, otherwise not permitted. Another utilization of "Location Based Cryptography" is get to control. (Ex-getting to printer in a room however can't access outside of room.). It is more suitable for banks, enormous organizations, Institutions.

Keywords: Authentication, Banking Application, GPS, LDEA, Shoulder Surfing, Security

References:

  1. Aishwarya Rathod, Bhagyalaxmi Kodre, Nida Sayyed, Ronak Sayta and Prof. Lata Sankpal, “Location Based Encryption for Secure Banking Transactions in mobile data environment” IJAERD, e-ISSN (O): 2348-4470, p-ISSN (P): 2348-6406, Volume 4, Issue 11, November -2017.
  2. Aishwarya Nair, Ankita Devrukhar, Karthika M. Vinod, Pallavi Lanke, “Protected Mobile Banking Using Location of Users”, IJARCCE, ISO 3297:2007 Certified, Vol. 6, Issue 4, April 2017.
  3. Sourish Mitra, Avijit Chakrabotry, Arunabha Bhaumik, Joy Devanjee, Mainak Maulik, “A location dependent cryptographic approach based on target coordinate from distanc tolarant key transfer for GPS mobile reciever”, IOSR-JCe, e-ISSN: 2278-0661, p-ISSn:2278-8727, Volume 17, Issue 1, Ver.VI 2015, pp 56-63.
  4. Mohammad Ahmdian, Jalal Khodabandeloo, Dan C. Marinescu, “A security scheme for geographic information databases in location based system”,IEEE southeast conference, 2015, Florida.
  5. Lakshmi Prasanna, Prof. E. Madhusudhan Reddy, “A Generalized Study on Encryption Techniques for Location Based Services”,IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 4, Ver. III (Jul – Aug. 2014), PP 19-26,2014.
  6. Amit Kushwaha, Vineet Kushwaha, “Location based services using android mobile operating System”, J. Adv. Eng. Technol., vol. 1,no. 1, pp. 1420, 2011.
  7. Hamad Hatem, Elkourd Souhir, “Data encryption using the dynamic location and speed of mobile node”, European, Mediterranean & MiddleEastern Conference on Information Systems 2010 (EMCIS2010) April 12-13 2010, Abu Dhabi, UAE.
  8. Sandeep Kumar, Mohammed Abdul Qadeer, Archana Gupta, “Location based services using Android”, IEEE Int. Conf. Soc. Comput., 2012, pp. 471480,2009.
  9. Hsien-Chou Liao and Yun-Hsiang Chao, “LDEA: Data encryption algorithm based on location of mobile users",Taiwan(R.O.C.), Journal 2008, Vol. 7, No. 1, p. 63-69.
  10. Yanchao Zhang, Wei Liu, Wenjing Lou and Yuguang Fang, “Securing sensor networks with location-based keys”, IEEE communication society/WCNC 2005, 0-7803-8966-2/05/$20.00 2005 IEEE.
  11. Christian Becker, Frank Durr, “On location models for ubiquitous computing”, 2005 9: 20-31, DOI: 10.1007/s00779-004-0270-2,2003.
  12. William Enck, Peter Gilbert, Byung-Gon Chun, “Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones”, 9th USENIX Conf. Oper. Syst.Des. Implementation, 2010, pp. 1–6.
  13. Tomas Sander Christian, F. Tschudin, “Towards Mobile Cryptography”, International Computer Science Institute, Berkeley, berkeley.edu

1-5

http://blueeyesintelligence.org/2checkout_download.html

2.

Authors:

Priyanka Pandey, R. R. Sedamkar

Paper Title:

Hybrid AES Algorithm with Enhanced Security for Heterogeneous Data

Abstract: This paper, presents the intricate Hybrid AES encryption method. Proposed algorithm’s design and evaluation of security enhancement is done by implementing and comparing Dynamic S-box with Round structure & Variable Key Cipher technique for heterogeneous data. AES is one of ciphering algorithm which is utilized for encryption, decryption of data to provide confidentiality for end to culminate data transmission. Improvement is finished in AES by modifying the S-box. The static S-box is created dynamic utilizing key programing with the repetition of variable cipher key. The improvement analysis relies on cryptography Time, decoding Time and Throughput. Performance enhancement for security is evaluated for all the four algorithms- AES, AES with Round structure, AES with Variable Key cipher and our proposed Hybrid algorithm- AES with Round Structure and Variable key Cipher. Here focus is to make system attack resistant & secure data from assailers.

Keywords: AES; S-box; Dynamic S-box, Round structure, Variable Key Cipher

References:

  1. T. K. Hue T. M. Hoang and D. Tran, "Chaos-based S-box for lightweight block cipher//Communications and Electronics (ICCE)”, IEEE Fifth International Conference IEEE, 2014.
  2. Guo Guang-liang, Qian Quan, Zhang Rui, "Different Implementations of AES Cryptographic Algorithm," High Performance Computing and Communications (HPCC), (CSS), and (ICESS) 2015 IEEE 17th International Conference, 2015.
  3. Scripcariu, L., "A study of methods used to improve encryption algorithms robustness," in Signals, Circuits and Systems (ISSCS) IEEE, 2015.
  4. Nilesh D., Nagle M., "The new cryptography algorithm with high throughput," in Computer Communication and Informatics (ICCCI) IEEE, 2014
  5. Chhotaray, S.K.; Chhotaray, A.; Rath, G.S., "A new method of generating public key matrix and using it for image encryption," in Signal Processing and Integrated Networks (SPIN), IEEE, 2015.
  6. Schneider, Computer-and-network-security. WilsoN Publications, 2014. [28] Ed Skoudis, Top-computer and- network-security. Mc Graw Hill, 2015.
  7. Stein, “Random patterns,” in Computers and You, J. S. Brake, Ed. New York: Wiley, 1994, pp. 55-70.
  8. Transmission Systems for Communications, 3rd ed., Western Electric Co., Winston-Salem, NC, 1985, pp. 44–60.
  9. Karsanbhai, G.R, Shajan, M.G, "128 bit AES implementation for secured wireless communication," in Emerging Trends in Networks and Computer Communications (ETNCC),IEEE ,2011
  10. Sahmod, W. Elmastry, S. Abudalta, ”Enhance the Security of AES Against Modern Attacks by Using Variable Key Block Cipher” in International Arab Journal of e-technology, 2013
  11. Daemen, "The Design of Rijndael-Advanced Encryption Standard", Nature 618.7532 (2015): 109110.
  12. http://www.onlineprogrammingbooks.com/itsecurity accessed 25-12-2016, 12:54 pm.
  13. http://www.garykessler.net/library/crypto.html accessed 25-12-2016, 12:58 am.

6-11

http://blueeyesintelligence.org/2checkout_download.html

3.

Authors:

R. Prakash Rao

Paper Title:

Various Power Dissipation Techniques for CMOS Inverter

Abstract: Low power design of complex CMOS circuits is one of the major challenges that is being addressed and will be addressed in nanometer design era. With integration of millions and billions of transistors on a single chip, transistor density is drastically increasing that lead to more and more complexity in applications being implemented on a single chip. Design time is another major challenge that forces designers to address the need in a very short time optimizing chip performances. In order to ensure that the design is through in the first iteration, designers are banking on new methodologies and ready made solutions to optimize area, time and power. Hence, various power dissipation techniques for CMOS inverter circuit are investigated here.

Keywords: Low Power Design, CMOS Circuits, Millions and Billions of Transistors, Transistor Density, Optimize Area, Time and Power.

References:

  1. Thomas Olsson, Peter Nilsson, Thomas Meincke ( 2000), “ADigitally Controlled Low-Power Clock Multiplier for Globally Asynchronous Locally Synchronous Designs”, ISCAS2000, IEEE Int. Symp., Circuits and Systems, Geneva, 
  2. A.A, Bayoumi. M.A (2001), “A novel architecture for low-power design of parallel multipliers”, VLSI Proc., IEEE Computer Society Workshop, pp. 149 – 154, May 2001.
  3. In-Chung Hwang, Sang-Hun Song, Soo-Won Kim (2001),“A Digitally Controlled Phase- Locked Loop with a Digital Phase-Frequency Detector for Fast Acquisition”, IEEE JSSC, vol. 36, pp. 1574-1581, Oct.2001.
  4. Ming-Chung Tang, R.C. Chang, Wei-Kuan Shih (2001), “Software Radio System Design for Accessing Wireless Multimedia Services”, Int., Journal of Computer Research on Advances in Information Processing and Technology, vol. 10, no. 3, pp. 347 - 360, 2001.
  5. Proakis (2001), “Digital Communications”, Fourth Edition, Mc.GH. pub
  6. Schwarzbacher A.Th., Silvennoinen J.P, Comiskey P.A (2002), “Benchmarking CMOS Adder Structures”, Irish Systems and Signal Conference, Cork, Ireland, pp. 231 – 234, June 2002.

12-14

http://blueeyesintelligence.org/2checkout_download.html