R.Felista Lizy

R.Felista Lizy
A.P.C. Mahalaxmi College for Women

MCA.M.PHIL.PhD
Assistant Professor

About

10
Publications
208
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
19
Citations
Introduction
Assistant Professor
Skills and Expertise
Additional affiliations
July 2008 - January 2021
Pope's College
Position
  • Assistant Professor
Description
  • Assistant Professor
Education
February 2018 - December 2022
Manonmaniam Sundaranar University
Field of study
  • Computer Applications
June 2008 - May 2009
PRIST University
Field of study
  • Computer Applications
June 2000 - November 2003
Independent Researcher
Independent Researcher
Field of study
  • Computer Applications

Publications

Publications (10)
Chapter
Hackers are inventing novel strategies to breach the encrypted information of practically all existing cryptographic algorithms, and therefore network security has always been an emerging study in communication technology. “Elliptic Curve Cryptography” (ECC) is a new cryptographic approach that has been demonstrated to work in public-key cryptosyst...
Chapter
This chapter gives a summary of the effects of Industry 4.0 (I 4.0) on various sectors, including manufacture, communication, transportation, and healthcare. A new wave of technical improvements called “Industry 4.0” focuses on automation, connectivity, and data exchange in manufacturing processes. The chapter highlights how I 4.0 is transforming m...
Chapter
Data security is ensured by the use of cryptography. Data security refers to the protection of data and privacy to prevent hackers from gaining unauthorized access to applications, computers, and data servers. Cryptography is a process of encrypting data and storing it in databases in a manner that anyone who gains access to it by accident is rende...
Preprint
Full-text available
The protection of the underlying networking infrastructure against illegal access, misuse, or theft is known as network security. It entails establishing a secure infrastructure that allows devices, applications, users, and applications to operate safely. The primary purpose of this study is to improve the RSA algorithm's security. As a result, imp...
Preprint
Full-text available
In the Aadhaar Card, security is a major issue. As the data once to be kept as private as possible, we will require some data-handling strategies. This document would be useful for data security. The advantage of this technique is in terms of text encryption and decryption security. Asymmetric algorithms include RSA (Rivest, Adi Shamir, and Leonard...
Patent
AVR CONSTRUCT is an android application that helps people plan out how they want their dream home to be built. A live, interactive simulation of a physical, real-world environment in which computer-generated sensory input augments the environment's characteristics is known as Augmented Reality (AR). With the introduction of personal mobile devices...
Article
Information Security has become an essential concern in the modern world. Encryption is an effective way to prevent an unofficial person from viewing the digital information with the secret key. RSA encryption is often used for digital signatures which can prove the authenticity and reliability of a message. As RSA encryption is less competent and...
Article
Cryptography is used for secretly sending information. The information or given data is protected by cryptographic technique. The technique is used in Text and images. The technique is supported by a lot of algorithms. RSA is a better encryption technique for smart cards. In this paper, an image in the Aadhaar card is encrypted using the RK-RSA alg...

Network

Cited By