%PDF-1.5
%
1 0 obj
<><><>]/ON[115 0 R]/Order[]/RBGroups[]>>/OCGs[63 0 R 115 0 R]>>/PageLayout/OneColumn/PageMode/UseNone/Pages 2 0 R/Type/Catalog>>
endobj
52 0 obj
<>/Font<>>>/Fields 110 0 R>>
endobj
53 0 obj
<>stream
2015-07-23T09:31:58+05:30
2015-07-30T20:08:42+05:30
2015-07-30T20:08:42+05:30
doPDF Ver 7.3 Build 391 (Windows 7 Business Edition (SP 1) - Version: 6.1.7601 (x86))
Key generation, Signcryption, Unsigncryption,DES,AES,Elliptic curve,Asymmetric algorithms.
application/pdf
Signcryption Approaches for Network Security
International Journal of Scientific & Engineering Research Volume 6, Issue 7, July-2015
S.K.B.Sangeetha, S.L.Jayalakshmi
Key generation
Signcryption
Unsigncryption
DES
AES
Elliptic curve
Asymmetric algorithms.
uuid:20f991b3-822b-4012-aedc-854cca2827de
uuid:723cad42-c003-4a86-b964-38545bb81538
endstream
endobj
2 0 obj
<>
endobj
3 0 obj
<>/Font<>/ProcSet[/PDF/Text]/XObject<>>>/Type/Page>>
endobj
30 0 obj
<>/ExtGState<>/Font<>/ProcSet[/PDF/Text/ImageC/ImageI]/XObject<>>>/Type/Page>>
endobj
36 0 obj
<>/Font<>/ProcSet[/PDF/Text]/XObject<>>>/Type/Page>>
endobj
38 0 obj
<>/Font<>/ProcSet[/PDF/Text]/XObject<>>>/Type/Page>>
endobj
43 0 obj
<>/Font<>/ProcSet[/PDF/Text]/XObject<>>>/Type/Page>>
endobj
130 0 obj
<>stream
HW[w6~_=ҞHu4}klxvizvb'ޱ4K $RCO .>6O|/rw}Q4%k4烻χ^ñu'9Ye}ˡ+XaEjR|nOJ%^wL]nÁ%CSQ:|p[)FYI`8]>Y[H gcfk}l0J
h] nhF`}{TCH6yj@&Q5i~iܱ!؍c\(-M'!'g]e4
uODqno/
.O[ Z9P"^;K! 1*Z}!BtxC0_B +bGڲk}0PS݃MaZ)Ahc-,&2.E Q%%DQȌ[fo7Jk'k,B|lD|.bP{bAyOAe=/KQS&ccI>0$uRdR=cE
6Z3c;I Px-b}s\Mt9c('RP1
ˉibEEZ'Jf7 + Co6eŃMK{bH"a7Ms:*ATȞkڸu9U&叶JDf*Pv&g*gylIJPbO UI.s#'~w[u
ҠZ?Ta㌲nϧx8N[ԾB.q,?Nѿhs7t;t6䓥EU]+hِn#9!G
^P=|x2Nd#w5Q7LO3\z&Ь;kbCwla\}X jt1}
LrnH$'f}~2Ne$9m=\!}8=*6d.4z_ɠxJln;ƲKJyX ؍kN?`'z#c =PO/PZ()UK