Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

An Improved Method for XML and Encryption


Affiliations
1 Department of Computer Science & Engineering, SNS College of Technology, Coimbatore, Tamilnadu, India
2 Department of Computer Science and Engineering at Kongu Engineering College, affiliated to Anna University, Coimbatore, Tamilnadu, India
3 Anna University, Coimbatore, Tamilnadu, India
     

   Subscribe/Renew Journal


In the early days cards have entered our global community. Although initially they were only used as simple phone cards they now support a large number of applications. This paper will mainly explain the Smart card architecture .This paper explains the algorithm used for this and also it explains the SOAP protocol used for the transmission of it. This paper mainly aimed at security and also used for the security purpose. Finally conclude that this technique is better for the transmission of the data.

Keywords

Cards, Attacks, Security, Encryption, SOAP Protocol.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 170

PDF Views: 3




  • An Improved Method for XML and Encryption

Abstract Views: 170  |  PDF Views: 3

Authors

V. T. Noora
Department of Computer Science & Engineering, SNS College of Technology, Coimbatore, Tamilnadu, India
C. Manusankar
Department of Computer Science & Engineering, SNS College of Technology, Coimbatore, Tamilnadu, India
T. Rajendran
Department of Computer Science and Engineering at Kongu Engineering College, affiliated to Anna University, Coimbatore, Tamilnadu, India
S. Karthik
Anna University, Coimbatore, Tamilnadu, India

Abstract


In the early days cards have entered our global community. Although initially they were only used as simple phone cards they now support a large number of applications. This paper will mainly explain the Smart card architecture .This paper explains the algorithm used for this and also it explains the SOAP protocol used for the transmission of it. This paper mainly aimed at security and also used for the security purpose. Finally conclude that this technique is better for the transmission of the data.

Keywords


Cards, Attacks, Security, Encryption, SOAP Protocol.