International Journal of Advance Computational Engineering and Networking (IJACEN)
.
Follow Us On :
current issues
Volume-10,Issue-8  ( Aug, 2022 )
Past issues
  1. Volume-10,Issue-7  ( Jul, 2022 )
  2. Volume-10,Issue-6  ( Jun, 2022 )
  3. Volume-10,Issue-5  ( May, 2022 )
  4. Volume-10,Issue-4  ( Apr, 2022 )
  5. Volume-10,Issue-3  ( Mar, 2022 )
  6. Volume-10,Issue-2  ( Feb, 2022 )
  7. Volume-10,Issue-1  ( Jan, 2022 )
  8. Volume-9,Issue-12  ( Dec, 2021 )
  9. Volume-9,Issue-11  ( Nov, 2021 )
  10. Volume-9,Issue-10  ( Oct, 2021 )

Statistics report
Dec. 2022
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 116
Paper Published : 1401
No. of Authors : 3560
  Journal Paper


Paper Title :
A Review on Data Encryption Techniques Used For Social Media on Internet

Author :Neha Sharma, Surendra Yadav, Brahmdutt Bohra

Article Citation :Neha Sharma ,Surendra Yadav ,Brahmdutt Bohra , (2016 ) " A Review on Data Encryption Techniques Used For Social Media on Internet " , International Journal of Advance Computational Engineering and Networking (IJACEN) , pp. 64-68, Volume-4, Issue-9

Abstract : In today’ scientific world the demand of new technologies based on software is increasing rapidly and on a large scale. These technologies are therefore used and implemented in computers and smart phones or any other such electronic device. With the advancement of computing environment there is an immense need of protecting it as well. We all know that today most of the people have their accounts on Google, facebook, whatsapp and other means of social media. But the question at the same time arises that how much secure our personal information is on these social media sites. In order to protect ourselves from any kind of unauthorized or malicious attacks we need to protect our data as much as we can. For data protection we need to encrypt it. In this paper we shall study some of the conventional encryption methods, importance of encryption, encryption used on social media and phones and the growing need of encryption with time. Keywords— Cryptography, Symmetric Encryption, Asymmetric Encryption, Public key, Private Key.

Type : Research paper

Published : Volume-4, Issue-9


DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-5854   View Here

Copyright: © Institute of Research and Journals

| PDF |
Viewed - 71
| Published on 2016-11-01
   
   
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World

JOURNAL SUPPORTED BY