Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Steganography is the branch of the cryptography in which the data has to be transmitted securely to the receiver end. In the process of steganography different types of steganography approaches has been used so that these can transmit... more
    • by 
    •   4  
      SteganographyLSBBlowfishPeak Signal to Noise Ratio (PSNR)
Over-potential or high Potential tests are frequently applied to machine stator windings to assure that the electrical insulation in windings is fit for service. However, several questions are frequently raised: When should a high... more
    • by 
    •   2  
      SecurityBlowfish
Encryption is essential in preventing unauthorized access to sensitive data in light of the growing concerns about data security in cloud computing. Homomorphic encryption promises to enable secure calculations on encrypted data without... more
    • by 
    •   6  
      Machine LearningEncryptionCloud ComputingDatabases
      Information is an essential and valuable object in all systems. The more information you have about your issue, the better you can conform to the world around you. Moreover, information recognizes companies and provides influence... more
    • by 
    •   5  
      Computer ScienceCryptographyEncryptionFlexibility in engineering design
Background: The technological revolution has allowed users to exchange data and information in various fields, and this is one of the most prevalent uses of computer technologies. However, in a world where third parties are capable of... more
    • by 
    •   20  
      EngineeringComputer ScienceComputational Complexity TheoryAlgorithms
Confidential data is concealed through encryption, which turns it into an unintelligible format. This study aims to evaluate the efficiency of encryption techniques for Image, Video, Audio, and Document Data Types in Java. This study... more
    • by 
    • Encryption Algorithms
Communication through mobile phones, Tablets and PDAs (Personal Digital Assistant) is the new trend in the era of globalization. In day-today activities, sensitive information through mobile phones is exchanged among the users. This... more
    • by 
    • by 
    •   9  
      Computer ScienceCryptographyEncryptionArtificial Neural Networks
    • by 
    •   4  
      Computer ScienceEncryptionBlock CipherPlaintext
Cloud computing is the following era computing stage that gives numerous applications to the clients in seamless way and get to the assets over the organize without any boundary. Mixed media content management and preparing is among the... more
    • by 
    •   4  
      ManagementHealth Care ManagementControlled GrazingCrisis situations
The use of technology is instructed but the creation of technology is the sophisticated part of it. Cryptography plays a vital role in Internet security. It is interlinked with the modern organizations to understand the usage of... more
    • by 
    •   5  
      Quantum ComputingInternet SecurityCryptographyInternet of Things (IoT)
Cloud computing is one of the most blazing innovations of the IT exchange for business. Cloud computing security has changed into a well-known theme in division and scholarly research. Cloud computing is a theoretical administration based... more
    • by 
    •   3  
      CryptographyCloud Computing SecurityElliptic Curve Cryptography
    • by 
    • Computer Science
Background: The technological revolution has allowed users to exchange data and information in various fields, and this is one of the most prevalent uses of computer technologies. However, in a world where third parties are capable of... more
    • by 
    •   20  
      EngineeringComputer ScienceComputational Complexity TheoryAlgorithms
    • by 
    •   11  
      Computer ScienceComputer SecurityEncryptionInstant Messaging
Smartphone is a phone that is smart enough to provide all the facilities to consumer which laptop and personal computer provides. Despite of that it lacks resources and battery backup as the usage of Smartphone's is getting prioritize... more
    • by 
    •   10  
      EngineeringComputer ScienceSecurityCloud Computing
Cryptography is a tool that can be used to keep information confidential and to ensure its integrity and authenticity. All modern cryptographic system are based on Kirchhoff’s principle of having a publicly known algorithm and a private... more
    • by 
    •   3  
      Computer ScienceCryptographyPublic key cryptography
Cloud computing is the on-demand availability of computer system resources, particularly data storage and computing power, without direct active management by the user. Here an online organ donation system is developed with the help of... more
    • by 
    •   8  
      Computer ScienceOrgan DonationComputer SecurityEncryption
    • by 
    • by 
    •   9  
      Computer ScienceComputer EngineeringComputer SecurityCryptography
In today's world, there are a number of cryptographic and steganographic techniques used in order to have secured data transfer between a sender and a receiver. In this paper we present a new hybrid approach that integrates the merits... more
    • by 
    •   11  
      Computer ScienceNetwork SecuritySecurityCryptography
    • by 
    •   4  
      Computer ScienceComputer NetworkWireless Sensor NetworkDenial of Service Attack
    • by 
    •   4  
      Computer ScienceCryptographyMicrocontrollerEmbedded System
    • by 
    •   2  
      Quantum entanglementQuantum Computer
    • by 
    •   5  
      Computer ScienceEncryptionComputer ApplicationsData Transmission
Recently, there is increasing interest in data transfer between many different devices. Data must be encrypted before being sent so that the intended receiver can only read it to prevent unauthorized access and processing of a secret... more
    • by 
    •   13  
      Computer ScienceComputer SecurityCryptographyEncryption
    • by 
    •   6  
      Computer ScienceComputer SecurityCryptographyEncryption
Now a days, as more and more information is communicated via computers, the need is to ensure that this information is secure and information can be secured by the means of encryption algorithms. Securing information refers to the... more
    • by 
    •   6  
      Computer ScienceComputer SecurityCryptographyEncryption
Tato semestrální práce je zaměřena na kryptografické metody. Část se věnuje blokovým šifrám, kde popisuje algoritmy Blowfish a 3DES. Dále se zabývá hashovacími funkcemi, z nich podrobně rozebírá algoritmy SHA-3 a Tiger.This semestral... more
    • by 
    •   5  
      CryptographyTigerDesBlowfish
    • by 
    •   3  
      MathematicsComputer ScienceEngineering Technology
    • by 
    •   4  
      Computer ScienceComputer NetworkWireless Sensor NetworkDenial of Service Attack
Recently, there is increasing interest in data transfer between many different devices. Data must be encrypted before being sent so that the intended receiver can only read it to prevent unauthorized access and processing of a secret... more
    • by 
    •   6  
      Computer SecurityCryptographySteganographyCyber Security
    • by 
    •   4  
      Computer ScienceEncryptionComputer Applicationssubstitution (logic)
    • by 
    •   5  
      Computer ScienceCryptographyEncryptionFlexibility in engineering design
    • by 
    •   12  
      Computer ScienceNetwork SecurityEnergy ConsumptionComputer Security
    • by 
    •   7  
      Computer ScienceCryptographyEncryptionAlgorithm
    • by 
    •   4  
      Computer ScienceCryptographyClean energy technologiesPower Consumption
Seiring dengan perkembangan informasi yang terus meningkat salah satunya penggunaan komputerisasi dalam berbagai bidang. Hal ini erat kaitannya dengan penggunaan password dalam area komputerisasi. Rawannya manupulasi password dinilai... more
    • by 
    •   2  
      Computer SciencePassword
    • by 
    •   4  
      Computer ScienceCryptographyEncryptionEngineering Technology
As there is enormous increase or rise in the data exchange by the electronic system, the requirements of information security has become a compulsion. The most important concern in the communication system which is between sender and... more
    • by 
Numerous cryptographic methods are accessible for filling the need of data security over the web, servers, and neighbourhood frameworks. Be that as it may, there is consistently request of greater security which may not be meet by such... more
    • by 
    •   4  
      SecurityServersFillingAccessible Learning
    • by 
    •   3  
      Computer ScienceEncryptionGrammar
    • by 
    •   4  
      Computer ScienceCloud ComputingComputer ApplicationsProxy Re-Encryption
Abstract: The aim of this paper proposes a project based implementation File Tracking System (FTS) used in private and mostly in government sector. This project is built on Railway System using three tier architecture. This application is... more
    • by 
    •   7  
      Computer ScienceRailway TransportFile SystemFile Transfer
In the field of cryptography, there has been a massive amount of enhancement in manipulating the plaintext which is unreadable, less prone to crackers and hackers, again manipulating this unreadable form to get back plaintext in some way.... more
    • by 
    •   6  
      EntropyCorrelation coefficientBlowfishS-box
In today’s competitive digital economy, the applications of cyber world require high level of security for expensive data. In recent years, a lot of research has taken place in direction to trim down the security issues by contributing... more
    • by 
    •   6  
      EncryptionAESRSADes
    • by 
    •   4  
      Computer ScienceCloud ComputingComputer ApplicationsProxy Re-Encryption
    • by 
    •   10  
      Computer ScienceCryptographyEncryptionData Security
    • by 
    •   9  
      Computer ScienceCryptographyEncryptionArtificial Neural Networks
    • by 
    •   9  
      Computer ScienceComputer ApplicationsDesSymmetric key encryption