51
Views
5
CrossRef citations to date
0
Altmetric
Articles

Hybrid cryptographic technique to secure data in web application

&

References

  • Khalid M. Abdullah, Essam H. Houssein, Hala H. Zayed, “New Security Protocol using Hybrid Cryptography Algorithm for WSN”. 1st International Conference on Computer Applications and Information Security (ICCAIS), IEEE, 4-6 April. 2018
  • Milind Mathur, Ayush Kesarwani, “Comparison between DES, 3DES, RC2, RC6, BLOWFISH, and AES”. Proceedings of National Conference on New Horizons in IT – NCNHIT 2013
  • V. Kapoor, Rahul Yadav, “A Hybrid Cryptography Technique for Improving Network Security”, International Journal of Computer Applications, Volume 141, No.11, May 2016. doi: 10.5120/ijca2016909863
  • M. Harini, K. Pushpa Gowri, C. Pavithra, M. Pradhiba Selvarani, “A Novel Security Mechanism Using Hybrid Cryptography Algorithms”. International Conference on Electrical, Instrumentation, and Communication Engineering (ICEICE), IEEE 2017.
  • Kalyani Ganesh Kadam, Prof. Vaishali Khairnar, “HYBRID RSA-AES ENCRYPTION FOR WEB SERVICES”. International Journal of Technical Research and Applications, Issue 31(September 2015), PP. 51-56.
  • Jayraj Gondaliya, Jinisha Savani, Vivek Sheetal Dhaduvai, Gahangir Hossain, “ Hybrid Security RSA Algorithm in Application of Web Service”. 1st International Conference on Data Intelligence and Security IEEE 2018.
  • A. Kumari, M. Y. Abbasi, V. Kumar, A. A. Khan, A secure user authentication protocol using elliptic curve cryptography, Journal of Discrete Mathematical Sciences and Cryptography 22 (4) 521–530 (2019). doi:10.1080/09720529.2019.1637155.
  • Yasmin Alkady, Mohmed I. Habib, Rawya Y. Rizk, “A New Security Protocol Using Hybrid Cryptography Algorithms”. 9th International Computer Engineering Conference (ICENCO), IEEE 2013.
  • Amrita Jain, Vivek Kapoor, “Secure Communication using RSA Algorithm for Network Environment”, International Journal of Computer Applications, Vol. 118, No. 7, May 2015. doi: 10.5120/20755-3153

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.