• Citations Per Year
Learn More
In today's scenario many audio/voice files are needed to be transmitted over internet for various important purposes. So protection of these files is an important issue. Efficient cryptographic methods are there to protect data but every thing depends on the protection of encryption key. That leads to single point failure. To overcome this drawback shared
This paper estimates the effects of China’s exchange rate changes on exports of competitor countries in third markets. We derive an econometric specification which includes product and destination-specific indices of competition between China and its developing country competitors. Our empirical strategy allows us to exploit the variation--afforded by(More)
In various applications such as military applications, commercial music systems, etc. audio needs to be transmitted over the network. During transmission, there is risk of attack through wiretapping. Hence there is need of secure transmission of the audio. There are various cryptographic methods to protect such data using encryption key. However, such(More)
In today’s scenario many audio/voice files are needed to be transmitted over internet for various important purposes. So protection of these files is an important issue. Efficient cryptographic methods are there to protect data but every thing depends on the protection of encryption key. That leads to single point failure. To overcome this drawback shared(More)
  • 1