Sorry, we do not have enough data to show an influence graph for this author.
- Full text PDF available (2)
- This year (0)
- Last 5 years (1)
- Last 10 years (2)
Journals and Conferences
In this work, attempt is made to select three good hash functions which uniformly distribute hash values that permute their internal states and allow the input bits to generate different output bits. These functions are used in different levels of hash tables that are coded in Java Programming Language and a quite number of data records serve as primary… (More)
This paper presents a novel solution to the age long problem of password security at input level. In our solution, each of the various characters from which a password could be composed is encoded with a random single digit integer and presented to the user via an input interface form. A legitimate user entering his password only needs to carefully study… (More)