Indian Journal of Science and Technology
DOI: 10.17485/ijst/2019/v12i48/149385
Year: 2019, Volume: 12, Issue: 48, Pages: 1-4
Original Article
Rajkumar N.1, Janhavi V.2 and A.B. Rajendra3,*
1 Accendere Knowledge Management Service Pvt Ltd, New Delhi, India
2 Department of Computer Science and Engineering, Vidyavardhaka College of Engineering, Mysuru, Karnataka, India
3 Department of Information Science and Engineering, Vidyavardhaka College of Engineering, Mysuru, Karnataka, India;
[email protected]
Objective: This study analyses out of exchanging security information. There is a strong requirement for access to various concentrations of delicate information at the edge; however, there is a greater danger than the key business setting at that place. Methods: This study explores the demands, technologies, and methods of threat mitigation to safely share information with the tactical user while preserving data and information systems from intruders and malware. Findings/ application: The new cryptography policy architecture requires to eliminate the architecture of stovepipe and free the accesses to communicate data across traditional and non-traditional field limits.
Keywords: Cryptography, Encryption, Decryption, Trust
Subscribe now for latest articles and news.