Please use this identifier to cite or link to this item:
https://idr.l1.nitk.ac.in/jspui/handle/123456789/8281
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Srivastava, A. | - |
dc.contributor.author | Pandey, V. | - |
dc.date.accessioned | 2020-03-30T10:18:20Z | - |
dc.date.available | 2020-03-30T10:18:20Z | - |
dc.date.issued | 2013 | - |
dc.identifier.citation | Proceedings of the 2013 3rd IEEE International Advance Computing Conference, IACC 2013, 2013, Vol., , pp.769-774 | en_US |
dc.identifier.uri | http://idr.nitk.ac.in/jspui/handle/123456789/8281 | - |
dc.description.abstract | The computational and storage limitations with silicon computers have propelled computer scientists to search for new dimensions in computer science. DNA computing emerges out to be a very promising field. The use of DNA strands would enable us to do complex calculations in seconds, which would have otherwise needed years. The volumes of data that can be stored have reached a new limit. Recently researchers of Harvard crack DNA storage and have been able to cram 700 terabytes of data into a single gram of DNA strand While developing any system a lot of design issues have to be taken into consideration and same is applicable for DNA computers. The paper makes an effort to deal with the consistency issue of DNA computers. A proof of inconsistency is provided and ground rules to a few DNA based cryptosystems are indexed which take advantage of the inconsistency and make use of it for data security. � 2013 IEEE. | en_US |
dc.title | Inconsistency in DNA computing and it's use in cryptography | en_US |
dc.type | Book chapter | en_US |
Appears in Collections: | 2. Conference Papers |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.