09-10-2012, 12:34 AM
class diagram for incraptive and decraptive mesage
09-10-2012, 12:34 AM
class diagram for incraptive and decraptive mesage
09-10-2012, 10:45 AM
to get information about the topic"file encryption and decryption module " full report refer the link bellow
https://seminarproject.net/Thread-wirele...1#pid99501
20-02-2017, 10:30 PM
ER and structure charts for encryption and decryption of a file
21-02-2017, 10:24 AM
ABSTRACT This discloses a method of encrypting and decrypting video files, a device and a mobile terminal. The encryption method may include: obtaining an encrypted video file and an encryption key, encrypting the video file using the encryption key to obtain an encrypted video file, obtaining scanned non-hidden partitions from a mobile terminal and an extended memory The mobile terminal to store user data, determine a partition that stores the video file to encrypt between non-hidden partitions and move the encrypted video file to a folder on the partition that stores the video file to be encrypted. The decryption method may include: obtaining a video file to decrypt and a decryption key, decrypting the video file to decrypt using the decryption key to obtain a decrypted video file and determining a pre-encrypted storage location of The A-to-be decrypted and move the decrypted video file to the pre-encrypted storage location of the video file to be decrypted. Induction Cloud storage is similar to cloud computing. It derives and extends from the concept of cloud computing. It refers to a system that through cluster network technology applications and distributed file systems and other functions, to make a variety of different types of storage devices through synergistic application software, and provides storage of Data and access to business externally. Typically, cloud storage means that source data or backup data will be placed in the storage group that users can not determine outside, instead of being located in a local data center or remote site dedicated. In fact, when using the cloud storage service, internal privacy data in the cloud has a certain risk. Before migrating data to the cloud, whether public or private cloud, the fundamental problem must be solved, that is, data security problems. Users are concerned that once the privacy data is loaded into the cloud, they can not have direct control over the stored data remotely. And the security of privacy data depends on the cloud storage provider service, but the cloud storage provider can not manage this privacy data in the cloud in a comprehensive and effective way, and many unreliable factors can bring Some security management issues. The basic method to protect data. Before uploading privacy data to the cloud, it has been encrypted in the local, even if the attackers stole the encrypted data, they would not know the actual content of the data. Therefore, it ensures the security of the privacy data in the cloud storage. When users need privacy data, data can be obtained from the cloud and decrypted in the local as well. |
|