DNA Computing in security
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
computer science crazy
Super Moderator

Posts: 3,048
Joined: Dec 2008
24-02-2009, 12:42 AM

DNA computing is a new method of simulating biomolecular structure of DNA and computing by means of molecular biology technological computation. It introduces a fire-new data structure and calculating method, providing a new way for solving the NP-complete problem. It is a new computational method by harnessing the enormous parallel computing ability and high memory density of bio-molecules, which brings potential challenges and opportunities to traditional cryptography. DNA cryptography is a new field of cryptography arising with DNA computing research in recent years. It can realize several security technologies such as Encryption, Steganography, Signature and Authentication by using DNA molecular as information medium. We firstly introduce the basic idea of DNA computing, and then discuss the information security technology in DNA computing.
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Tagged Pages: dna computing in security, dna computing iv security,
Popular Searches: dna computing in security full report, dna and dna computing in security, related ppt on dna computing in security, ppt dna computing in security, dna computing in security ppt pdf seminar report, dna computing will ryu, dna in computing security deminar abstract,

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Security using colors and Armstrong numbers Moiz ansari 2 148 21-10-2015, 12:10 PM
Last Post: mkaasees
  Wireless Sensor Network Security model using Zero Knowledge Protocol seminar ideas 2 1,413 31-03-2015, 09:08 AM
Last Post: Guest
  security features of atm ppt jaseelati 0 268 16-02-2015, 04:47 PM
Last Post: jaseelati
  abstract cybercrime and security paper presentation jaseelati 0 269 13-02-2015, 02:01 PM
Last Post: jaseelati
  security features of atm abstract jaseelati 0 275 17-01-2015, 04:13 PM
Last Post: jaseelati
  difference between soc and aoc in mobile computing jaseelati 0 313 20-12-2014, 01:12 PM
Last Post: jaseelati
  Cloud Computing abstract seminar tips 4 5,238 20-06-2014, 03:40 PM
Last Post: s.vmurugan@yahoo.com
  Towards Secure and Dependable Storage Services in Cloud Computing FULL REPORT seminar ideas 5 4,112 24-03-2014, 02:51 PM
Last Post: seminar project topic
  Introduction to Cloud Computing project uploader 4 4,629 22-03-2014, 05:27 PM
Last Post: navasfiroz
  Security Framework for Wireless Communications in Smart Distribution Grid seminar tips 2 1,011 28-10-2013, 10:56 AM
Last Post: purplepearls