SB20 technique used to secure the data
The current globe is the data globe. This data is produced using online media; this data is rampant; this data does not have incredible security; hereafter, we apply the Salsa technique to beat this issue. This technique successfully hacks the data from the software engineers. SB20 strategy has 5 ph...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | 1 |
container_start_page | |
container_title | |
container_volume | 2519 |
creator | Somasundaram, K. Parthipan, P. Ramesh, R. Rajes Kanan, S. |
description | The current globe is the data globe. This data is produced using online media; this data is rampant; this data does not have incredible security; hereafter, we apply the Salsa technique to beat this issue. This technique successfully hacks the data from the software engineers. SB20 strategy has 5 phases. To use the mystery key S. To discover the n esteem with the assistance of k. Apply the n esteem proper condition. To trade a and b esteems from left in the matrix. To locate the perfect numbers and pair those numbers from left to right. The SB20 strategy gives extraordinary security while appearing differently about the Salsa technique. This creator has utilized a new hash idea for critical speculating and ending conditions. Creator has presented the bricklayer assault for the investigation of ChaCha. They focus on the security for Double-A. They made a new plan for fast quick, and adaptable calculation. SRB18 strategy used to give protection to information. SRB21 and SRB22 approaches are used to provide security to data. CBB21 and CBB22 techniques are used to provide security to information. |
doi_str_mv | 10.1063/5.0110864 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>proquest_scita</sourceid><recordid>TN_cdi_proquest_journals_2720625349</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2720625349</sourcerecordid><originalsourceid>FETCH-LOGICAL-p2034-eb72c209f365651dfa4ba242fe7f08688ab1f366dc860f078a792717896c755e3</originalsourceid><addsrcrecordid>eNp9kEtLAzEUhYMoOFYX_oOA4EKYevNOllrqAwouVHAXMpmETtHOmGQE_70jLbhzdRfnO-ceDkLnBOYEJLsWcyAEtOQHqCJCkFpJIg9RBWB4TTl7O0YnOW8AqFFKV-jy-ZYCLsGvt93nGPCYQ4tLj3PwYwq4rANuXXGn6Ci69xzO9neGXu-WL4uHevV0_7i4WdUDBcbr0CjqKZjIpJCCtNHxxlFOY1BxKqW1a8ikydZrCRGUdspQRZQ20ishApuhi13ukPqpTi52049pO720VFGQVDBuJupqR2XfFVe6fmuH1H249G2_-mSF3W9ghzb-BxOwv6P9GdgPSsxanw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype><pqid>2720625349</pqid></control><display><type>conference_proceeding</type><title>SB20 technique used to secure the data</title><source>AIP Journals Complete</source><creator>Somasundaram, K. ; Parthipan, P. ; Ramesh, R. ; Rajes Kanan, S.</creator><contributor>Loganathan, K. ; Sakthivel, P.</contributor><creatorcontrib>Somasundaram, K. ; Parthipan, P. ; Ramesh, R. ; Rajes Kanan, S. ; Loganathan, K. ; Sakthivel, P.</creatorcontrib><description>The current globe is the data globe. This data is produced using online media; this data is rampant; this data does not have incredible security; hereafter, we apply the Salsa technique to beat this issue. This technique successfully hacks the data from the software engineers. SB20 strategy has 5 phases. To use the mystery key S. To discover the n esteem with the assistance of k. Apply the n esteem proper condition. To trade a and b esteems from left in the matrix. To locate the perfect numbers and pair those numbers from left to right. The SB20 strategy gives extraordinary security while appearing differently about the Salsa technique. This creator has utilized a new hash idea for critical speculating and ending conditions. Creator has presented the bricklayer assault for the investigation of ChaCha. They focus on the security for Double-A. They made a new plan for fast quick, and adaptable calculation. SRB18 strategy used to give protection to information. SRB21 and SRB22 approaches are used to provide security to data. CBB21 and CBB22 techniques are used to provide security to information.</description><identifier>ISSN: 0094-243X</identifier><identifier>EISSN: 1551-7616</identifier><identifier>DOI: 10.1063/5.0110864</identifier><identifier>CODEN: APCPCS</identifier><language>eng</language><publisher>Melville: American Institute of Physics</publisher><subject>Security</subject><ispartof>AIP conference proceedings, 2022, Vol.2519 (1)</ispartof><rights>Author(s)</rights><rights>2022 Author(s). All article content, except where otherwise noted, is licensed under a Creative Commons Attribution 3.0 Unported License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://pubs.aip.org/acp/article-lookup/doi/10.1063/5.0110864$$EHTML$$P50$$Gscitation$$Hfree_for_read</linktohtml><link.rule.ids>309,310,314,777,781,786,787,791,4498,23911,23912,25121,27905,27906,76133</link.rule.ids></links><search><contributor>Loganathan, K.</contributor><contributor>Sakthivel, P.</contributor><creatorcontrib>Somasundaram, K.</creatorcontrib><creatorcontrib>Parthipan, P.</creatorcontrib><creatorcontrib>Ramesh, R.</creatorcontrib><creatorcontrib>Rajes Kanan, S.</creatorcontrib><title>SB20 technique used to secure the data</title><title>AIP conference proceedings</title><description>The current globe is the data globe. This data is produced using online media; this data is rampant; this data does not have incredible security; hereafter, we apply the Salsa technique to beat this issue. This technique successfully hacks the data from the software engineers. SB20 strategy has 5 phases. To use the mystery key S. To discover the n esteem with the assistance of k. Apply the n esteem proper condition. To trade a and b esteems from left in the matrix. To locate the perfect numbers and pair those numbers from left to right. The SB20 strategy gives extraordinary security while appearing differently about the Salsa technique. This creator has utilized a new hash idea for critical speculating and ending conditions. Creator has presented the bricklayer assault for the investigation of ChaCha. They focus on the security for Double-A. They made a new plan for fast quick, and adaptable calculation. SRB18 strategy used to give protection to information. SRB21 and SRB22 approaches are used to provide security to data. CBB21 and CBB22 techniques are used to provide security to information.</description><subject>Security</subject><issn>0094-243X</issn><issn>1551-7616</issn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2022</creationdate><recordtype>conference_proceeding</recordtype><recordid>eNp9kEtLAzEUhYMoOFYX_oOA4EKYevNOllrqAwouVHAXMpmETtHOmGQE_70jLbhzdRfnO-ceDkLnBOYEJLsWcyAEtOQHqCJCkFpJIg9RBWB4TTl7O0YnOW8AqFFKV-jy-ZYCLsGvt93nGPCYQ4tLj3PwYwq4rANuXXGn6Ci69xzO9neGXu-WL4uHevV0_7i4WdUDBcbr0CjqKZjIpJCCtNHxxlFOY1BxKqW1a8ikydZrCRGUdspQRZQ20ishApuhi13ukPqpTi52049pO720VFGQVDBuJupqR2XfFVe6fmuH1H249G2_-mSF3W9ghzb-BxOwv6P9GdgPSsxanw</recordid><startdate>20221003</startdate><enddate>20221003</enddate><creator>Somasundaram, K.</creator><creator>Parthipan, P.</creator><creator>Ramesh, R.</creator><creator>Rajes Kanan, S.</creator><general>American Institute of Physics</general><scope>AJDQP</scope><scope>8FD</scope><scope>H8D</scope><scope>L7M</scope></search><sort><creationdate>20221003</creationdate><title>SB20 technique used to secure the data</title><author>Somasundaram, K. ; Parthipan, P. ; Ramesh, R. ; Rajes Kanan, S.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p2034-eb72c209f365651dfa4ba242fe7f08688ab1f366dc860f078a792717896c755e3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Security</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Somasundaram, K.</creatorcontrib><creatorcontrib>Parthipan, P.</creatorcontrib><creatorcontrib>Ramesh, R.</creatorcontrib><creatorcontrib>Rajes Kanan, S.</creatorcontrib><collection>AIP Open Access Journals</collection><collection>Technology Research Database</collection><collection>Aerospace Database</collection><collection>Advanced Technologies Database with Aerospace</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Somasundaram, K.</au><au>Parthipan, P.</au><au>Ramesh, R.</au><au>Rajes Kanan, S.</au><au>Loganathan, K.</au><au>Sakthivel, P.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>SB20 technique used to secure the data</atitle><btitle>AIP conference proceedings</btitle><date>2022-10-03</date><risdate>2022</risdate><volume>2519</volume><issue>1</issue><issn>0094-243X</issn><eissn>1551-7616</eissn><coden>APCPCS</coden><abstract>The current globe is the data globe. This data is produced using online media; this data is rampant; this data does not have incredible security; hereafter, we apply the Salsa technique to beat this issue. This technique successfully hacks the data from the software engineers. SB20 strategy has 5 phases. To use the mystery key S. To discover the n esteem with the assistance of k. Apply the n esteem proper condition. To trade a and b esteems from left in the matrix. To locate the perfect numbers and pair those numbers from left to right. The SB20 strategy gives extraordinary security while appearing differently about the Salsa technique. This creator has utilized a new hash idea for critical speculating and ending conditions. Creator has presented the bricklayer assault for the investigation of ChaCha. They focus on the security for Double-A. They made a new plan for fast quick, and adaptable calculation. SRB18 strategy used to give protection to information. SRB21 and SRB22 approaches are used to provide security to data. CBB21 and CBB22 techniques are used to provide security to information.</abstract><cop>Melville</cop><pub>American Institute of Physics</pub><doi>10.1063/5.0110864</doi><tpages>7</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0094-243X |
ispartof | AIP conference proceedings, 2022, Vol.2519 (1) |
issn | 0094-243X 1551-7616 |
language | eng |
recordid | cdi_proquest_journals_2720625349 |
source | AIP Journals Complete |
subjects | Security |
title | SB20 technique used to secure the data |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-18T08%3A21%3A12IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_scita&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=SB20%20technique%20used%20to%20secure%20the%20data&rft.btitle=AIP%20conference%20proceedings&rft.au=Somasundaram,%20K.&rft.date=2022-10-03&rft.volume=2519&rft.issue=1&rft.issn=0094-243X&rft.eissn=1551-7616&rft.coden=APCPCS&rft_id=info:doi/10.1063/5.0110864&rft_dat=%3Cproquest_scita%3E2720625349%3C/proquest_scita%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2720625349&rft_id=info:pmid/&rfr_iscdi=true |