Provided by: Journal of Theoretical and Applied Information Technology
Date Added: Apr 2014
Encryption scheme is widely used in the field of communication network security. The network systems are focus on reliability, service and functions, which provided end-to-end service to protect encrypted data node. It enables to interconnect the various functional levels to interact and communicate with each other. An interconnected group of nodes use a computational model for data processing, which is based on a node connections approach. In this paper, data are transmitted from 'N' inputs as packets (e.g. 1 byte), through hardware based EP, shows polarized output after checking bits.