The book consists of seven chapters out of which aspects of cryptosystems, synopsis of neural cryptosystem and security issues discussed in chapters are defined at the begining. Different factors in evaluating various techniques along with structure of keys are also prescribed. Second chapter of the book deals with Artificial Neural Network and its various models, training of ANN along its various principles in security aspects are prescribed. Neural network guided secret key based cryptographic technique through chaining mechanism has been presented in chapter three. S-box operation based...
The book consists of seven chapters out of which aspects of cryptosystems, synopsis of neural cryptosystem and security issues discussed in chapters ...
The second international conference on INformation Systems Design and Intelligent Applications (INDIA 2015) held in Kalyani, India during January 8-9, 2015. The book covers all aspects of information system design, computer science and technology, general sciences, and educational research. Upon a double blind review process, a number of high quality papers are selected and collected in the book, which is composed of two different volumes, and covers a variety of topics, including natural language processing, artificial intelligence, security and privacy, communications, wireless and...
The second international conference on INformation Systems Design and Intelligent Applications (INDIA 2015) held in Kalyani, India during January 8...
The second international conference on INformation Systems Design and Intelligent Applications (INDIA 2015) held in Kalyani, India during January 8-9, 2015. The book covers all aspects of information system design, computer science and technology, general sciences, and educational research. Upon a double blind review process, a number of high quality papers are selected and collected in the book, which is composed of two different volumes, and covers a variety of topics, including natural language processing, artificial intelligence, security and privacy, communications, wireless and sensor...
The second international conference on INformation Systems Design and Intelligent Applications (INDIA 2015) held in Kalyani, India during January 8-9,...
The two volume set CCIS 775 and 776 constitutes the refereed proceedings of the First International Conference on Computational Intelligence, Communications, and Business Analytics, CICBA 2017, held in Kolkata, India, in March 2017.The 90 revised full papers presented in the two volumes were carefully reviewed and selected from 276 submissions.
The two volume set CCIS 775 and 776 constitutes the refereed proceedings of the First International Conference on Computational Intelligence, Communic...
The volume contains latest research work presented at International Conference on Computing and Communication Systems (I3CS 2016) held at North Eastern Hill University (NEHU), Shillong, India.
The volume contains latest research work presented at International Conference on Computing and Communication Systems (I3CS 2016) held at North Easter...
J. K. Mandal Paramartha Dutta Somnath Mukhopadhyay
This edited volume on computational intelligence algorithms-based applications includes work presented at the International Conference on Computational Intelligence, Communications, and Business Analytics (CICBA 2017).
This edited volume on computational intelligence algorithms-based applications includes work presented at the International Conference on Computationa...