Key Generation in the Light of Mining and Fuzzy Rule

2008 
Summary Information security plays a major role in case of secured data transmission . In this paper some intelligent techniques have been pointed out regarding shared key generation. In case of multiparty communication the concept of shared key is essential that therein the security level is increased, as the entire key is not transmitted. Various proposed techniques have been cited based on minimal frequent set, candidate generation, partition scheme, intersection of item-set count. The paper also deals with the efficient generation of shared keys required for direct communication among co-processors without active participation of server. Hence minimization of timecomplexity , proper utilization of resource as well as environment for parallel computing can be achieved with higher throughput in secured fashion. The techniques involved are cryptic methods based on feature analysis centroid analysis, inter-centroid distance , extraction scheme of vowel , index position of character , support analysis and confidence rule. We have also proposed several schemes for key evaluation based on theory of central tendencies and curves without transmission of the entire key through the channel thereby making the hacker confused regarding the value of the shared key.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    1
    References
    1
    Citations
    NaN
    KQI
    []