Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Most of the information is in the form of electronic data. A lot of electronic data exchanged takes place through computer applications. Therefore information exchange through these applications needs to be secure. Different cryptographic... more
    • by 
    •   12  
      Computer ScienceAESDesRc
In this era of information technology and e-commerce security is the key aspect while transmitting confidential information over insecure network like internet. In order to protect the information, various security mechanisms are used.... more
    • by 
    •   11  
      Applied CryptographyCryptographyEncryptionCryptology
— Computer information has taken over many aspects of everyday life. One of those aspects has been smart grids which have evolved into a more complex system. However, with the advantages that smart grids come with, disadvantages... more
    • by 
    •   8  
      Information SecuritySmart GridData SecurityRSA ALGORITHM
In recent days, voice recognition system is used in various impending segments like banking, communication, industrial and government sectors. Most applications are used in real time which are vulnerable to various security threats. It... more
    • by 
    •   6  
      Deep LearningBlowfishConvolutional Neural NetworksSecurity Threats
In recent days, voice recognition system is used in various impending segments like banking, communication, industrial and government sectors. Most applications are used in real time which are vulnerable to various security threats. It... more
    • by 
    •   6  
      Deep LearningBlowfishConvolutional Neural NetworksSecurity Threats
This paper aims to analyse the dysfunctional family relations explored in Kazuo Ishiguro's "A Family Supper". The symbolism and lines spoken by the characters are going to be analyzed in correlation with the elements of Japanese... more
    • by 
    •   8  
      PostmodernismJapanese CultureAlienationPost-War Literature
    • by 
    •   9  
      Computer ScienceAlgorithmsImage ProcessingComputer Engineering
Security is the most challenging aspects in the internet and network applications. Internet and networks applications are growing very fast, so the importance and the value of the exchanged data over the internet or other media types are... more
    • by 
    •   8  
      Computer ScienceCryptographyEncryptionAES
This thesis paper tries to present a fair compare between the most common and used algorithms in the data encryption field. The two main features that identify and differentiate one encryption algorithm from another are its power to... more
    • by 
    •   7  
      SecurityCryptographyEncryptionData Security
    • by 
    •   8  
      Network SecurityComputer SecurityAESEncryption Techniques
    • by 
    •   7  
      Witchcraft (Anthropology Of Religion)MonstrosityFishingForeigners
    • by 
    •   6  
      Information TechnologyInformation SecurityComputer SecurityCryptography
Cloud computing has grown very quickly to become a promising business idea in the IT industry due to its characteristics such as cost reduction, flexibility, convenience, and scalability. The wide spread of Cloud Computing was accompanied... more
    • by 
    •   18  
      PrivacyComputer SecurityCryptographyEncryption
In today’s era, secure transmission of confidential data is of biggest concern. The encryption plays an important role in transmission of secure data. The encryption means converting the original data to cipher text. The main issue is... more
    • by 
    •   9  
      EncryptionAESRSARc6
To create secure information transmission over the network cryptography is used. The algorithm particular for cryptography should complete the integrity protection condition, conventional information authentication and digital signatures.... more
    • by 
    •   5  
      BiometricsCryptographyAESBlowfish
This paper presents the statistical test of randomness on the Blowfish Block Cipher 128-bit is continuation with our eaelier papers title" Randomness Analysis on Blowfish Block Cipher using ECB mode" and "Randomness Analysis on Blowfish... more
    • by 
    •   6  
      Computer ScienceInformation SecurityComputer SecurityCryptography
    • by 
    •   8  
      Computer ScienceInformation TechnologySecurityCryptography
Steganography is the branch of the cryptography in which the data has to be transmitted securely to the receiver end. In the process of steganography different types of steganography approaches has been used so that these can transmit... more
    • by 
    •   4  
      SteganographyLSBBlowfishPeak Signal to Noise Ratio (PSNR)
The different computer networks whether wired or wireless are becoming more popular with its high security aspect. Different security algorithms and technique are using to avoid any aforementioned attacks. One of these technique is a... more
    • by 
    •   5  
      AESAESDesEncryption and Decryption
Security is the most crucial aspects in the internet and network applications. Internet and networks applications are growing very fast, so the importance and the value of the exchanged data over the internet is increasing. Hence the... more
    • by 
    •   6  
      Computer ScienceInformation SecurityComputer SecurityCryptography
    • by 
    •   6  
      Computer ScienceAlgorithmsEngineering Science and TechnologyAES
Tingginya kebutuhan informasi saat ini mendorong tumbuhnya metode pengamanan informasi. Seni penyandian dan pengamanan pesan yang disebut kriptografi ini berkembang sangat cepat saat ini. Penggunaan komputer dijital saat ini mendorong... more
    • by 
    •   7  
      Information TechnologyTechnologyCryptographyWeb Programming
    • by 
    •   7  
      Computer ScienceInformation SecuritySecurityComputer Security
The limitations of humans to maintain the security and confidentiality of stored data can have a bad impact if it is used by unauthorized parties. One way to secure shipping is to convert data into one that is not understood by encoding... more
    • by  and +1
    •   12  
      CryptographyMySQLKriptografiDatastructures and Algorithms
    • by 
    •   6  
      Information TechnologyInformation SecurityComputer SecurityCryptography
Most of the information is in the form of electronic data. A lot of electronic data exchanged takes place through computer applications. Therefore information exchange through these applications needs to be secure. Different cryptographic... more
    • by  and +1
    •   11  
      AESDesRc4Blowfish
Cloud storage is an online data storage and it is located as centrally.Cloud data ownerprovidethe facility for users to online store their data and access from any location. Though it has reliable for the user to achieve a secure and... more
    • by 
    •   6  
      DesIDEAKacAbe
    • by 
    •   20  
      Computer ScienceDistributed ComputingEncryptionElliptic curve cryptography for encryption and digital signature
    • by 
    •   6  
      Computer ScienceInformation TechnologyCryptographyAES
Nowadays multimedia system knowledge protection is changing into important. The coding technique is employed to safeguard multimedia system knowledge. There are completely different techniques wont to defend confidential image knowledge... more
    • by 
    •   4  
      EncryptionBlowfishData Encryption StandardMODIFIED ADVANCED ENCRYPTION STANDARD ALGORITHM
    • by 
    •   4  
      CryptographyIdeasSecurity in Cloud ComputingBlowfish
    • by 
    •   20  
      Distributed ComputingEncryptionElliptic curve cryptography for encryption and digital signatureComputer Software
The security of Cloud computing has been a quickly developing administration which has numerous highlighted services over internet which reduces the cost and operating expenses. The greatest favorable position of cloud administrations is... more
    • by 
    •   3  
      CryptographyIdeasBlowfish
    • by 
    •   5  
      Computer ScienceImage ProcessingCryptographyBlowfish
Abstract:- Security is the most challenging aspects in the internet and network applications. Cryptography is the one of the main categories of computer security that converts information from its normal form into an unreadable form. The... more
    • by 
    •   5  
      CryptographyEncryptionAESDes
Security is the most crucial aspects in the internet and network applications. Internet and networks applications are growing very fast, so the importance and the value of the exchanged data over the internet is increasing. Hence the... more
    • by 
    •   6  
      Computer ScienceInformation SecurityComputer SecurityCryptography
    • by 
    •   9  
      Computer ScienceComputer EngineeringComputer SecurityCryptography
Cryptographic applications are becoming increasingly more important in today's world of data exchange, big volumes of data need to be transferred safely from one location to another at high speed. In this paper, the parallel... more
    • by  and +1
    •   33  
      EncryptionStegnography and Encryption and Eye Tracking and AlgorithmsElliptic curve cryptography for encryption and digital signatureMPI
The limitations of humans to maintain the security and confidentiality of stored data can have a bad impact if it is used by unauthorized parties. One way to secure shipping is to convert data into one that is not understood by encoding... more
    • by 
    •   14  
      Computer ScienceCryptographyMySQLKriptografi
Smartphone has become the most typical and popular mobile device in recent years. It combines the functionality of mobile phone and PDA. Besides, it provides many computers' functionality, Middleware as processing, communication, data... more
    • by 
    •   3  
      Computer ScienceBlowfishSmartphone Security
Ciphering algorithms play a main role in information security systems. Those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. This research tries to demonstrate a fair comparison... more
    • by 
    •   5  
      Distributed ComputingAestheticsDesignComputer Security