Information Security : An Artificial Intelligence and Data Mining Based Approach

Download Now
Provided by: International Journal of Engineering and Technology
Topic: Security
Format: PDF
Information security plays a major role in case of secured data transmission. In this paper some intelligent techniques have been pointed out regarding effective cipher generation based on SKEY, interlock protocol and SKID. The authors have also cited cryptosystems based on linear property of propositional operator, the concept of fuzzy logic, optimized function and concept of data mining based on comparison analysis. Various proposed techniques have also been pointed out for shared key evaluation in multi-party communication and the areas concerned are shared key generation based on support rule, cent percent confidence rule, minimal frequent set and sequence mining and feature-based method.
Download Now

Find By Topic