Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Most of the information is in the form of electronic data. A lot of electronic data exchanged takes place through computer applications. Therefore information exchange through these applications needs to be secure. Different cryptographic... more
    • by 
    •   12  
      Computer ScienceAESDesRc
How can you make your first project, and every project, successful? Modeling can certainly be fun, but it can also be quite challenging. You want your first and every project to be successful so you can justify continued work.... more
    • by 
    •   7  
      Project ManagementModeling and SimulationSimulationStudent Success
In this era of information technology and e-commerce security is the key aspect while transmitting confidential information over insecure network like internet. In order to protect the information, various security mechanisms are used.... more
    • by 
    •   11  
      Applied CryptographyCryptographyEncryptionCryptology
    • by 
    •   6  
      Computer ScienceCryptographySurveyAES
Dry eye syndrome (DES) is a relatively common condition with signs and symptoms varying from light irritation to functional blindness as a result of corneal opacification. The disorder generally occurs in subjects over 40 years of age.... more
    • by 
    •   4  
      PunctumDesOcularVaries
    • by 
    •   8  
      Computer ScienceInformation SecuritySecurityComputer Security
    • by 
    •   7  
      Computer ScienceImage ProcessingEncryptionECC
Cryptography is the art and science of keeping massages secure. It is the study of techniques related to aspects of information security such as information privacy, integrity, authentication and non-repudiation. Cryptography is almost... more
    • by 
    •   8  
      Computer ScienceInformation SecurityComputer SecurityCryptography
ABSTRAK Kata sandi atau password digunakan untuk mengamankan data privasi yang tidak boleh diketahui sembarang orang. Di zaman teknologi seperti sekarang, terutama sistem informasi, kata sandi menjadi pokok atau menjadi privasi hal yang... more
    • by  and +2
    •   7  
      CryptographyPHP Programmingphp/MySQLDes
    • by 
    • Des
Manusia hidup saling berkomunikasi antara satu dengan yang lain, di antara informasi-informasi tersebut, pastilah ada informasi yang bersifat rahasia, artinya hanya boleh diketahui oleh orang-orang tertentu saja..Contoh lainnya banyak... more
    • by 
    •   4  
      DesEnkripsiUnirowKataSandi
Any communication in the language that you and I speak—that is the human language, takes the form of plain text or clear text. That is, a message in plain text can be understood by anybody knowing the language as long as the message is... more
    • by 
    •   19  
      Computer ScienceImage ProcessingComputer Supported Cooperative Work (CSCW)Power Electronics
ABSTRAK Kata sandi atau password digunakan untuk mengamankan data privasi yang tidak boleh diketahui sembarang orang. Di zaman teknologi seperti sekarang, terutama sistem informasi, kata sandi menjadi pokok atau menjadi privasi hal yang... more
    • by 
    •   6  
      PHPPHP ProgrammingCriptographyDes
Terdapat beberapa cara untuk menangani masalah keamanan data rahasia yang dikirimkan melalui internet, diantaranya adalah menggunakan teknik kriptografi dan steganografi. Steganografi merupakan ilmu dan seni penyembunyian informasi/pesan... more
    • by 
    •   5  
      DesSteganografiEnd of FileEOF
Security is the most challenging aspects in the internet and network applications. Internet and networks applications are growing very fast, so the importance and the value of the exchanged data over the internet or other media types are... more
    • by 
    •   8  
      Computer ScienceCryptographyEncryptionAES
    • by 
    •   13  
      Environmental EngineeringCivil EngineeringGeologyHydrogeology
Cette étude vise à améliorer la connaissance de la structure du bassin de Tadla en se basant sur l'analyse et l'interprétation des données gravimétriques. Une carte de l'anomalie résiduelle a d'abord été calculée à partir de la carte de... more
    • by 
    •   13  
      Environmental EngineeringCivil EngineeringGeologyHydrogeology
    • by 
    •   6  
      Computer ScienceCryptographyVerilogDes
    • by 
    •   8  
      Network SecurityComputer SecurityAESEncryption Techniques
Rapid growth of digital communication and multimedia application increases the need of security and it becomes an important issue of communication and storage of multimedia. Image Encryption is one of the techniques that are used to... more
    • by 
    •   5  
      Information SecurityCryptographyImage EncryptionAES
    • by 
    •   8  
      Teacher TrainingDesCPTCIP
    • by 
    •   7  
      Mathematics of CryptographyCryptographyData EncryptionCryptography Engineering
In today’s era, secure transmission of confidential data is of biggest concern. The encryption plays an important role in transmission of secure data. The encryption means converting the original data to cipher text. The main issue is... more
    • by 
    •   9  
      EncryptionAESRSARc6
    • by  and +2
    •   18  
      Mobile Ad Hoc NetworksEmbedded SystemsCryptographyGlobal Positioning System
    • by 
    •   8  
      Computer ScienceImage ProcessingCryptographyEncryption
    • by 
    •   8  
      Computer ScienceInformation SecuritySecurityComputer Security
    • by  and +2
    •   7  
      Environmental EngineeringCivil EngineeringGeologyHydrogeology
    • by 
    •   8  
      Computer ScienceInformation TechnologySecurityCryptography
    • by 
    •   13  
      Environmental EngineeringCivil EngineeringGeologyHydrogeology
ABSTRAK Manusia hidup saling berkomunikasi antara satu dengan yang lain, di antara informasi-informasi tersebut, pastilah ada informasi yang bersifat rahasia, artinya hanya boleh diketahui oleh orang-orang tertentu saja..Contoh lainnya... more
    • by 
    •   4  
      DesEnkripsiUnirowKataSandi
The different computer networks whether wired or wireless are becoming more popular with its high security aspect. Different security algorithms and technique are using to avoid any aforementioned attacks. One of these technique is a... more
    • by 
    •   5  
      AESAESDesEncryption and Decryption
    • by  and +2
    •   7  
      Environmental EngineeringCivil EngineeringGeologyHydrogeology
    • by 
    •   6  
      Computer ScienceAlgorithmsEngineering Science and TechnologyAES
This paper discusses the use of Genetic Algorithm (G.A.) for DES cryptanalysis for the most two famous attacks Differential Attack & Linear Attack in order to enhance the attack overall performance. This paper presents a new proposed... more
    • by 
    •   12  
      CryptographyGenetic AlgorithmCryptanalysisDifferential cryptanalysis
    • by 
    •   13  
      Environmental EngineeringCivil EngineeringGeologyHydrogeology
Detached eddy simulation (DES) is a suitable method for the simulation of the sound radiation of turbulent flows, providing access to resolved turbulent scales at minimal computational cost. The near-wall region is solved efficiently by... more
    • by 
    •   17  
      EngineeringComputational Fluid DynamicsFluid MechanicsComputational Aeroacoustics
The data encryption standard (DES) is one of the most common symmetric encryption algorithms, but it experiences many problems. For example, it uses only one function (XOR) in the encryption process, and the combination of data is finite... more
    • by 
    •   4  
      DesInformation security encryptionMulti-level keysSymmetric block cipher
Deep eutectic solvents (DESs) are a class of green solvents exhibiting low vapor pressure, high thermal stability, low toxicity, and biodegradability. These features make them attractive solvents for lignocellulosic biomass processing,... more
    • by  and +1
    •   5  
      BiofuelsLigninDesDeep Eutectic Solvents
    • by 
    •   6  
      Environmental EngineeringCivil EngineeringClimate ChangeClimate Model
Deep eutectic solvent (DES) is intrinsically cheaper than many ionic liquids (ILs) due to low precursor cost, simple synthesis, and improved recyclability. Meanwhile DES can be as effective as ILs towards dissolving lignin from plant... more
    • by 
    •   2  
      DesPretreatment
Most of the information is in the form of electronic data. A lot of electronic data exchanged takes place through computer applications. Therefore information exchange through these applications needs to be secure. Different cryptographic... more
    • by  and +1
    •   11  
      AESDesRc4Blowfish
    • by 
    •   17  
      Environmental EngineeringCivil EngineeringCzech RepublicConcentration
tentang DES
    • by 
    • Des
— An enhance privacy preserving data using multi-keyword ranked search scheme over encrypted cloud data increasing popularity of cloud computing, data owners are motivated to share data to the cloud server's security and cost reduction.... more
    • by 
    •   8  
      EncryptionCloud ComputingThe InternetInfrastructure
    • by 
    •   13  
      Environmental EngineeringCivil EngineeringGeologyHydrogeology
    • by 
    •   5  
      RSAComputer ApplicationsToDes
ABSTRAK Manusia hidup saling berkomunikasi antara satu dengan yang lain, di antara informasi-informasi tersebut, pastilah ada informasi yang bersifat rahasia, artinya hanya boleh diketahui oleh orang-orang tertentu saja..Contoh lainnya... more
    • by 
    •   3  
      Desata Encryption StandardAlgiritma Des
Cloud storage is an online data storage and it is located as centrally.Cloud data ownerprovidethe facility for users to online store their data and access from any location. Though it has reliable for the user to achieve a secure and... more
    • by 
    •   6  
      DesIDEAKacAbe
HAL is a multi-disciplinary open access archive for the deposit and dissemination of sci-entific research documents, whether they are pub-lished or not. The documents may come from teaching and research institutions in France or abroad,... more
    • by 
    •   4  
      FPGACPADesSide Channel attacks