Secure Sharing of Data using an Algorithm Namely KAN

  • et al.
N/ACitations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Large amount of data is transferred through the internet, which is highly insecure. This can cause disruption of data due to attacks. To resist those attacks, the analysts are centered on the distinctive sort of systems to verify the information from assaults. Some of the techniques are AES, DES, and Digital Signatures etc. These techniques are not providing abnormal state proficient of security. So, in order to increase the efficiency level, we proposed a new method called KAN algorithm which is an extension of RSA algorithm to enhance the security of normal data by utilizing graph theory approach. This algorithm can be applicable for military basis and highly information secure system.

Cite

CITATION STYLE

APA

Naidu, S. N., Kousik, I., & Thaseen, S. (2019). Secure Sharing of Data using an Algorithm Namely KAN. International Journal of Innovative Technology and Exploring Engineering, 8(9), 2959–2966. https://doi.org/10.35940/ijitee.i8523.078919

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free