2014 IEEE International Conference on Computational Intelligence and Computing Research 2014
DOI: 10.1109/iccic.2014.7238559
|View full text |Cite
|
Sign up to set email alerts
|

Evolutionary genetic algorithm for encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 2 publications
0
3
0
Order By: Relevance
“…Encode all connections where conceivable. Encryption is the most common way of covering or changing data through a code or a code with the goal that it becomes garbled to any remaining individuals aside from the people who hold the key to the data [8][10] [13]. The subsequent encoded data is called scrambled data.…”
Section: Encryptionmentioning
confidence: 99%
See 2 more Smart Citations
“…Encode all connections where conceivable. Encryption is the most common way of covering or changing data through a code or a code with the goal that it becomes garbled to any remaining individuals aside from the people who hold the key to the data [8][10] [13]. The subsequent encoded data is called scrambled data.…”
Section: Encryptionmentioning
confidence: 99%
“…The subsequent encoded data is called scrambled data. Data is a significant resource for an organization [13]. So its security is dependably quite difficult for an association.…”
Section: Encryptionmentioning
confidence: 99%
See 1 more Smart Citation