Des
12 Followers
Recent papers in Des
Deep eutectic solvents (DES) based on water as the only hydrogen bond donor (HBD) have been introduced recently (aquoline). There is not a single report on surfactant association behaviour in aquoline. This study deals with the... more
In today’s age safeguarding data privacy and security has become a priority, for organizations in various industries. The rise in cyber threats and strict regulations highlight the need for measures to secure data. The findings indicate... more
DNA Computing has emerged as a promising field since its inception when Leonard M. Adleman first used DNA for solving computational problem of the Hamiltonian Path in 1994 [1]. DNA Self Assembly utilizes ’bottom-up’ approach for design... more
In this contribution instances of a problem introduced by the differential cryptanalysis of Feistel cryptosystems are formulated as optimization tasks. The performance of Evolutionary Computation methods on these tasks is studied for a... more
Information is an essential and valuable object in all systems. The more information you have about your issue, the better you can conform to the world around you. Moreover, information recognizes companies and provides influence... more
Ilmu kriptografi merupakan sebuah informasi yang akan disampaikan kepada pihak lain dengan bentuk yang tidak dimengerti. Pada saat ini ilmu kriptografi sangat diperlukan sebagai pertukaran informasi /data. Begitu pentingan informasinya... more
Several proof-assistants rely on the very formal basis of Pure Type Systems (PTS) as their foundations. We are concerned with the issues involved in the development of large proofs in these provers such as namespace management,... more
As the amount of data and information received and sent electronically increases in various Small and Medium Enterprises, companies and organizations, the adoption of cloud Database as a Service is becoming popular in the global business... more
- by Abdulrahman Yusuf
- Encryption, AES, Des, TDS
In this era of communication Data Security is primary concern. This paper introduce the concept of Clocked Hybrid Encryption .The term clocked hybrid represent DES & AES hybrid algorithm which is synchronized with key . In this algorithm... more
Wireless sensor networks (WSNs) have gained attention Worldwide in recent years. Because of potential of physical isolation, these sensors have wide range of applications in land based security, military security and much more. As WSNs... more
As the amount of data and information received and sent electronically increases in various Small and Medium Enterprises, companies and organizations, the adoption of cloud Database as a Service is becoming popular in the global business... more
- by aminu bello ahmad
- Encryption, AES, Des, TDS
In recent years, lignin valorization is commercially an important and advanced sustainable process for lignocellulosic biomass-based industries, primarily through the depolymerization path. The conversion of the lignin moieties into... more
Confidential data is concealed through encryption, which turns it into an unintelligible format. This study aims to evaluate the efficiency of encryption techniques for Image, Video, Audio, and Document Data Types in Java. This study... more