Des
12 Followers
Recent papers in Des
Most of the information is in the form of electronic data. A lot of electronic data exchanged takes place through computer applications. Therefore information exchange through these applications needs to be secure. Different cryptographic... more
How can you make your first project, and every project, successful? Modeling can certainly be fun, but it can also be quite challenging. You want your first and every project to be successful so you can justify continued work.... more
In this era of information technology and e-commerce security is the key aspect while transmitting confidential information over insecure network like internet. In order to protect the information, various security mechanisms are used.... more
Dry eye syndrome (DES) is a relatively common condition with signs and symptoms varying from light irritation to functional blindness as a result of corneal opacification. The disorder generally occurs in subjects over 40 years of age.... more
Cryptography is the art and science of keeping massages secure. It is the study of techniques related to aspects of information security such as information privacy, integrity, authentication and non-repudiation. Cryptography is almost... more
Manusia hidup saling berkomunikasi antara satu dengan yang lain, di antara informasi-informasi tersebut, pastilah ada informasi yang bersifat rahasia, artinya hanya boleh diketahui oleh orang-orang tertentu saja..Contoh lainnya banyak... more
Any communication in the language that you and I speak—that is the human language, takes the form of plain text or clear text. That is, a message in plain text can be understood by anybody knowing the language as long as the message is... more
ABSTRAK Kata sandi atau password digunakan untuk mengamankan data privasi yang tidak boleh diketahui sembarang orang. Di zaman teknologi seperti sekarang, terutama sistem informasi, kata sandi menjadi pokok atau menjadi privasi hal yang... more
Terdapat beberapa cara untuk menangani masalah keamanan data rahasia yang dikirimkan melalui internet, diantaranya adalah menggunakan teknik kriptografi dan steganografi. Steganografi merupakan ilmu dan seni penyembunyian informasi/pesan... more
Security is the most challenging aspects in the internet and network applications. Internet and networks applications are growing very fast, so the importance and the value of the exchanged data over the internet or other media types are... more
Cette étude vise à améliorer la connaissance de la structure du bassin de Tadla en se basant sur l'analyse et l'interprétation des données gravimétriques. Une carte de l'anomalie résiduelle a d'abord été calculée à partir de la carte de... more
Rapid growth of digital communication and multimedia application increases the need of security and it becomes an important issue of communication and storage of multimedia. Image Encryption is one of the techniques that are used to... more
In today’s era, secure transmission of confidential data is of biggest concern. The encryption plays an important role in transmission of secure data. The encryption means converting the original data to cipher text. The main issue is... more
ABSTRAK Manusia hidup saling berkomunikasi antara satu dengan yang lain, di antara informasi-informasi tersebut, pastilah ada informasi yang bersifat rahasia, artinya hanya boleh diketahui oleh orang-orang tertentu saja..Contoh lainnya... more
The different computer networks whether wired or wireless are becoming more popular with its high security aspect. Different security algorithms and technique are using to avoid any aforementioned attacks. One of these technique is a... more
This paper discusses the use of Genetic Algorithm (G.A.) for DES cryptanalysis for the most two famous attacks Differential Attack & Linear Attack in order to enhance the attack overall performance. This paper presents a new proposed... more
Detached eddy simulation (DES) is a suitable method for the simulation of the sound radiation of turbulent flows, providing access to resolved turbulent scales at minimal computational cost. The near-wall region is solved efficiently by... more
The data encryption standard (DES) is one of the most common symmetric encryption algorithms, but it experiences many problems. For example, it uses only one function (XOR) in the encryption process, and the combination of data is finite... more
Deep eutectic solvent (DES) is intrinsically cheaper than many ionic liquids (ILs) due to low precursor cost, simple synthesis, and improved recyclability. Meanwhile DES can be as effective as ILs towards dissolving lignin from plant... more
— An enhance privacy preserving data using multi-keyword ranked search scheme over encrypted cloud data increasing popularity of cloud computing, data owners are motivated to share data to the cloud server's security and cost reduction.... more
ABSTRAK Manusia hidup saling berkomunikasi antara satu dengan yang lain, di antara informasi-informasi tersebut, pastilah ada informasi yang bersifat rahasia, artinya hanya boleh diketahui oleh orang-orang tertentu saja..Contoh lainnya... more
HAL is a multi-disciplinary open access archive for the deposit and dissemination of sci-entific research documents, whether they are pub-lished or not. The documents may come from teaching and research institutions in France or abroad,... more