Proceeding
Full conference PDF is available to the subscribed user. Use your subscription login to access,
Study and Literature Survey of Data Encryption Algorithm for Wireless Application
Rapid growth in internet uses for data processing upshots the value of network information security.
Nowadays the Internet is used for correspondence of all sorts. Many internet users often regard this as the platform
for sensitive data sharing. In the present computer epoch and rapid communication, however, transmitted
information must be secured against unauthorized users. Therefore, visual data security is a significant concern in the
design of communications systems. When visual data is transmitted via unsecured communication networks,
techniques for data hiding and visual cryptography are used to add confidentiality and security within this paper it
presents a detailed analysis of various methods for data encryption.
Data Encryption Standard (DES), Cryptography
15-21
108521
IMPORTANT DAYS
Paper Submission Last Date
February 19th, 2022
Notification of Acceptance
March 7th, 2022
Camera Ready Paper Submission & Author's Registration
February 19th, 2022
Date of Conference
March 11th, 2022
Publication
March 22nd, 2022