SB20 technique used to secure the data

The current globe is the data globe. This data is produced using online media; this data is rampant; this data does not have incredible security; hereafter, we apply the Salsa technique to beat this issue. This technique successfully hacks the data from the software engineers. SB20 strategy has 5 ph...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Somasundaram, K., Parthipan, P., Ramesh, R., Rajes Kanan, S.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue 1
container_start_page
container_title
container_volume 2519
creator Somasundaram, K.
Parthipan, P.
Ramesh, R.
Rajes Kanan, S.
description The current globe is the data globe. This data is produced using online media; this data is rampant; this data does not have incredible security; hereafter, we apply the Salsa technique to beat this issue. This technique successfully hacks the data from the software engineers. SB20 strategy has 5 phases. To use the mystery key S. To discover the n esteem with the assistance of k. Apply the n esteem proper condition. To trade a and b esteems from left in the matrix. To locate the perfect numbers and pair those numbers from left to right. The SB20 strategy gives extraordinary security while appearing differently about the Salsa technique. This creator has utilized a new hash idea for critical speculating and ending conditions. Creator has presented the bricklayer assault for the investigation of ChaCha. They focus on the security for Double-A. They made a new plan for fast quick, and adaptable calculation. SRB18 strategy used to give protection to information. SRB21 and SRB22 approaches are used to provide security to data. CBB21 and CBB22 techniques are used to provide security to information.
doi_str_mv 10.1063/5.0110864
format Conference Proceeding
fullrecord <record><control><sourceid>proquest_scita</sourceid><recordid>TN_cdi_proquest_journals_2720625349</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2720625349</sourcerecordid><originalsourceid>FETCH-LOGICAL-p2034-eb72c209f365651dfa4ba242fe7f08688ab1f366dc860f078a792717896c755e3</originalsourceid><addsrcrecordid>eNp9kEtLAzEUhYMoOFYX_oOA4EKYevNOllrqAwouVHAXMpmETtHOmGQE_70jLbhzdRfnO-ceDkLnBOYEJLsWcyAEtOQHqCJCkFpJIg9RBWB4TTl7O0YnOW8AqFFKV-jy-ZYCLsGvt93nGPCYQ4tLj3PwYwq4rANuXXGn6Ci69xzO9neGXu-WL4uHevV0_7i4WdUDBcbr0CjqKZjIpJCCtNHxxlFOY1BxKqW1a8ikydZrCRGUdspQRZQ20ishApuhi13ukPqpTi52049pO720VFGQVDBuJupqR2XfFVe6fmuH1H249G2_-mSF3W9ghzb-BxOwv6P9GdgPSsxanw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype><pqid>2720625349</pqid></control><display><type>conference_proceeding</type><title>SB20 technique used to secure the data</title><source>AIP Journals Complete</source><creator>Somasundaram, K. ; Parthipan, P. ; Ramesh, R. ; Rajes Kanan, S.</creator><contributor>Loganathan, K. ; Sakthivel, P.</contributor><creatorcontrib>Somasundaram, K. ; Parthipan, P. ; Ramesh, R. ; Rajes Kanan, S. ; Loganathan, K. ; Sakthivel, P.</creatorcontrib><description>The current globe is the data globe. This data is produced using online media; this data is rampant; this data does not have incredible security; hereafter, we apply the Salsa technique to beat this issue. This technique successfully hacks the data from the software engineers. SB20 strategy has 5 phases. To use the mystery key S. To discover the n esteem with the assistance of k. Apply the n esteem proper condition. To trade a and b esteems from left in the matrix. To locate the perfect numbers and pair those numbers from left to right. The SB20 strategy gives extraordinary security while appearing differently about the Salsa technique. This creator has utilized a new hash idea for critical speculating and ending conditions. Creator has presented the bricklayer assault for the investigation of ChaCha. They focus on the security for Double-A. They made a new plan for fast quick, and adaptable calculation. SRB18 strategy used to give protection to information. SRB21 and SRB22 approaches are used to provide security to data. CBB21 and CBB22 techniques are used to provide security to information.</description><identifier>ISSN: 0094-243X</identifier><identifier>EISSN: 1551-7616</identifier><identifier>DOI: 10.1063/5.0110864</identifier><identifier>CODEN: APCPCS</identifier><language>eng</language><publisher>Melville: American Institute of Physics</publisher><subject>Security</subject><ispartof>AIP conference proceedings, 2022, Vol.2519 (1)</ispartof><rights>Author(s)</rights><rights>2022 Author(s). All article content, except where otherwise noted, is licensed under a Creative Commons Attribution 3.0 Unported License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://pubs.aip.org/acp/article-lookup/doi/10.1063/5.0110864$$EHTML$$P50$$Gscitation$$Hfree_for_read</linktohtml><link.rule.ids>309,310,314,777,781,786,787,791,4498,23911,23912,25121,27905,27906,76133</link.rule.ids></links><search><contributor>Loganathan, K.</contributor><contributor>Sakthivel, P.</contributor><creatorcontrib>Somasundaram, K.</creatorcontrib><creatorcontrib>Parthipan, P.</creatorcontrib><creatorcontrib>Ramesh, R.</creatorcontrib><creatorcontrib>Rajes Kanan, S.</creatorcontrib><title>SB20 technique used to secure the data</title><title>AIP conference proceedings</title><description>The current globe is the data globe. This data is produced using online media; this data is rampant; this data does not have incredible security; hereafter, we apply the Salsa technique to beat this issue. This technique successfully hacks the data from the software engineers. SB20 strategy has 5 phases. To use the mystery key S. To discover the n esteem with the assistance of k. Apply the n esteem proper condition. To trade a and b esteems from left in the matrix. To locate the perfect numbers and pair those numbers from left to right. The SB20 strategy gives extraordinary security while appearing differently about the Salsa technique. This creator has utilized a new hash idea for critical speculating and ending conditions. Creator has presented the bricklayer assault for the investigation of ChaCha. They focus on the security for Double-A. They made a new plan for fast quick, and adaptable calculation. SRB18 strategy used to give protection to information. SRB21 and SRB22 approaches are used to provide security to data. CBB21 and CBB22 techniques are used to provide security to information.</description><subject>Security</subject><issn>0094-243X</issn><issn>1551-7616</issn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2022</creationdate><recordtype>conference_proceeding</recordtype><recordid>eNp9kEtLAzEUhYMoOFYX_oOA4EKYevNOllrqAwouVHAXMpmETtHOmGQE_70jLbhzdRfnO-ceDkLnBOYEJLsWcyAEtOQHqCJCkFpJIg9RBWB4TTl7O0YnOW8AqFFKV-jy-ZYCLsGvt93nGPCYQ4tLj3PwYwq4rANuXXGn6Ci69xzO9neGXu-WL4uHevV0_7i4WdUDBcbr0CjqKZjIpJCCtNHxxlFOY1BxKqW1a8ikydZrCRGUdspQRZQ20ishApuhi13ukPqpTi52049pO720VFGQVDBuJupqR2XfFVe6fmuH1H249G2_-mSF3W9ghzb-BxOwv6P9GdgPSsxanw</recordid><startdate>20221003</startdate><enddate>20221003</enddate><creator>Somasundaram, K.</creator><creator>Parthipan, P.</creator><creator>Ramesh, R.</creator><creator>Rajes Kanan, S.</creator><general>American Institute of Physics</general><scope>AJDQP</scope><scope>8FD</scope><scope>H8D</scope><scope>L7M</scope></search><sort><creationdate>20221003</creationdate><title>SB20 technique used to secure the data</title><author>Somasundaram, K. ; Parthipan, P. ; Ramesh, R. ; Rajes Kanan, S.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p2034-eb72c209f365651dfa4ba242fe7f08688ab1f366dc860f078a792717896c755e3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Security</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Somasundaram, K.</creatorcontrib><creatorcontrib>Parthipan, P.</creatorcontrib><creatorcontrib>Ramesh, R.</creatorcontrib><creatorcontrib>Rajes Kanan, S.</creatorcontrib><collection>AIP Open Access Journals</collection><collection>Technology Research Database</collection><collection>Aerospace Database</collection><collection>Advanced Technologies Database with Aerospace</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Somasundaram, K.</au><au>Parthipan, P.</au><au>Ramesh, R.</au><au>Rajes Kanan, S.</au><au>Loganathan, K.</au><au>Sakthivel, P.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>SB20 technique used to secure the data</atitle><btitle>AIP conference proceedings</btitle><date>2022-10-03</date><risdate>2022</risdate><volume>2519</volume><issue>1</issue><issn>0094-243X</issn><eissn>1551-7616</eissn><coden>APCPCS</coden><abstract>The current globe is the data globe. This data is produced using online media; this data is rampant; this data does not have incredible security; hereafter, we apply the Salsa technique to beat this issue. This technique successfully hacks the data from the software engineers. SB20 strategy has 5 phases. To use the mystery key S. To discover the n esteem with the assistance of k. Apply the n esteem proper condition. To trade a and b esteems from left in the matrix. To locate the perfect numbers and pair those numbers from left to right. The SB20 strategy gives extraordinary security while appearing differently about the Salsa technique. This creator has utilized a new hash idea for critical speculating and ending conditions. Creator has presented the bricklayer assault for the investigation of ChaCha. They focus on the security for Double-A. They made a new plan for fast quick, and adaptable calculation. SRB18 strategy used to give protection to information. SRB21 and SRB22 approaches are used to provide security to data. CBB21 and CBB22 techniques are used to provide security to information.</abstract><cop>Melville</cop><pub>American Institute of Physics</pub><doi>10.1063/5.0110864</doi><tpages>7</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 0094-243X
ispartof AIP conference proceedings, 2022, Vol.2519 (1)
issn 0094-243X
1551-7616
language eng
recordid cdi_proquest_journals_2720625349
source AIP Journals Complete
subjects Security
title SB20 technique used to secure the data
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-18T08%3A21%3A12IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_scita&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=SB20%20technique%20used%20to%20secure%20the%20data&rft.btitle=AIP%20conference%20proceedings&rft.au=Somasundaram,%20K.&rft.date=2022-10-03&rft.volume=2519&rft.issue=1&rft.issn=0094-243X&rft.eissn=1551-7616&rft.coden=APCPCS&rft_id=info:doi/10.1063/5.0110864&rft_dat=%3Cproquest_scita%3E2720625349%3C/proquest_scita%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2720625349&rft_id=info:pmid/&rfr_iscdi=true