CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

A Model of E-Correspondence with Error Correction

by Abhishek Shukla, Meenu Sahni, Deo Brat Ojha
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 12 - Number 10
Year of Publication: 2011
Authors: Abhishek Shukla, Meenu Sahni, Deo Brat Ojha
10.5120/1719-2306

Abhishek Shukla, Meenu Sahni, Deo Brat Ojha . A Model of E-Correspondence with Error Correction. International Journal of Computer Applications. 12, 10 ( January 2011), 25-28. DOI=10.5120/1719-2306

@article{ 10.5120/1719-2306,
author = { Abhishek Shukla, Meenu Sahni, Deo Brat Ojha },
title = { A Model of E-Correspondence with Error Correction },
journal = { International Journal of Computer Applications },
issue_date = { January 2011 },
volume = { 12 },
number = { 10 },
month = { January },
year = { 2011 },
issn = { 0975-8887 },
pages = { 25-28 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume12/number10/1719-2306/ },
doi = { 10.5120/1719-2306 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:01:18.819281+05:30
%A Abhishek Shukla
%A Meenu Sahni
%A Deo Brat Ojha
%T A Model of E-Correspondence with Error Correction
%J International Journal of Computer Applications
%@ 0975-8887
%V 12
%N 10
%P 25-28
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper, we presented a model of e-correspondence with error correction for Internet communication. It is the model of a real-life secure e-correspondence system for any organization. In this model a sender can send a secret message even to a unacquainted person in an anonymous way. The users of this model are assumed to be may or may not be the members of a closed organization.

References
  1. A. Menezes, M. Qu, and S. Vanstone, “Key agree-ment and the need for authentication,” in Proceed-ings of PKS’95, pp. 34-42, 1995.
  2. M. Niimi, H. Noda and E. Kawaguchi :"An image embedding in image by a complexity based region segmentation method", Proceedings of International Conf. on Image Processing'97, Vol.3, pp.74-77, Santa Barbara, Oct., 1997.
  3. E. Kawaguchi and R. O. Eason :"Principle and applications of BPCS- Steganography", Proceedings of SPIE: Multimeda Systems and Applications, Vol.3528, pp.464-463, 1998.
  4. L. Law, A. Menezes, M. Qu, J. Solinas, and S. Van- stone, An Efficient Protocol for Authenticated Key Agreement, Technical Report CORR98-05, Department of CO,University of Waterloo, 1998.
  5. E. Kawaguchi,et al: “A concept of digital picture envelope for Internet communication”in Information modeling and knowledge bases X,IOS Press, pp.343-349, 1999.
  6. Stefan Katzenbeisser and Fabien A.P. Petitcolas (eds) :“Information hiding techniques for steganography and digital watermarking”, Artech House, 2000.
  7. Neil F. Johnson, Zoran Duric and Sushil Jajodia :“Information Hiding”, Kluwer Academic Publishers, 2001.
  8. K. H. Ko, D. H. Choi, M. S. Cho, and J. W. Lee, “New signature scheme using conjugacy problem.”(http://eprint.iacr.org/2002/168).
  9. L. Law, A. Menezes, M. Qu, J. Solinas, and S. Van-stone, “An efficient protocol for authenticated key agreement,” Design, Codes and Cryptography, vol. 28, no. 2, pp. 119-134, 2003.
  10. Eiji Kawaguchi, Hideki Noda, Michiharu Niimi and Richard O. Eason, A Model of Anonymous Covert Mailing System Using Steganographic Scheme, Information modelling and knowledge bases X,IOS Press, pp.81-85,2003.
  11. X.Yi, An Identity-Based Signature Scheme From the Weil Pairing,IEEE communications letters 7(2),76-78, 2003.
  12. URL http://www.know.comp.kyutech.ac.jp/BPCSe/Dpenv-e/DPENVe- pro_ down. html.
  13. X.Cheng, L.Guo, X.Wang,An Identity-based Mediated Signature Scheme from Bilinear Pairing, International Journal of Network Security,2(1):29-33, 2006. http://isrc.nchu.edu.tw/ijns.
  14. Xiaofeng Wang, Liang Cao, Shangping Wang,Yaling Zhang, ID-Based Convertible Limited (Multi-)Verifier Signature Scheme,2008 International Conference on Computer Science and Software Engineering.774-777.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography e-correspondence system Bilinear pairing Error Correction Code