A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is
With the capabilities of computing increasing by leaps and bounds, the need for trusted communication also rises. The present state of ensuring secure communication between devices largely relies on the use of cryptographic keys. The primitive and advanced key generation strategies involve the use of password only, biometric, quantum, PRNG technologies. Recently, the use of contextual information to generate highly secure keys has proven to be a realistic and unobstructed method in the field ofdoi:10.5120/ijca2016908123 fatcat:gvdh2kdzvzcltipzenabr3qqsy