Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Cloud computing is the apt technology for the decade. It allows user to store large amount of data in cloud storage and use as and when required, from any part of the world, via any terminal equipment. While Cloud services offer... more
    • by 
    •   6  
      Computer ScienceCloud ComputingCloud Computing SecurityDes
Nowadays, due to the position of technology, the need for cyber security has increased considerably. The most personal information of people is easily accessible on the internet. Information such as banking information, personal... more
    • by 
    •   6  
      Algorithm AnalysisPerformance EvaluationSeaRSA
    • by 
    •   6  
      Computer ScienceInformation TechnologyCryptographyAES
Abstract- Cloud computing is the apt technology for the decade. It allows user to store large amount of data in cloud storage and use as and when required, from any part of the world, via any terminal equipment. While Cloud services offer... more
    • by 
    •   6  
      Computer ScienceCloudCloud SecurityDes
GSM (Global System for Mobile Communications, originally Groupe Spécial Mobile), is a standard set developed by the European Telecommunications Standards Institute (ETSI) to describe protocols for second generation (2G) digital cellular... more
    • by 
    •   5  
      SecurityGSMAESDes
    • by 
    •   11  
      FPGACPACryptographyField-Programmable Gate Arrays
    • by 
    • Des
    • by 
    •   5  
      Computer ScienceComputer EngineeringNetwork SecurityRSA
    • by 
    •   10  
      Environmental EngineeringCivil EngineeringEnvironmental ScienceClimate Change
-Due to fast growing of telecommunication technology and limitation for information transmission there is a need to use an efficient cryptography algorithm which takes less space after encryption for the ciphertext. Some performance... more
    • by 
    •   11  
      MathematicsComputer ScienceComputer EngineeringNetwork Security
    • by 
    •   9  
      Computer ScienceEncryptionAESRSA
    • by 
    •   9  
      Computer ScienceImage ProcessingInformation SecurityCryptography
Paper tentang Criptografi Data Encryption Standart
    • by 
    • Des
1Department of Environmental Engineering and Sustainable Development, Technical University of Bari, Engineering Faculty of Taranto, Viale del Turismo 8, I-74100, Taranto, Italy 2Department of Civil and Environmental Engineering, Technical... more
    • by  and +1
    •   26  
      Environmental EngineeringCivil EngineeringOrdinary Differential EquationsMethodology
    • by 
    •   5  
      Environmental EngineeringCivil EngineeringClimate variabilityDesertification
    • by 
    •   3  
      CryptographyCloud ComputingDes
    • by 
    •   7  
      Computer ScienceInformation TechnologySecurityCryptography
Abstract:- Security is the most challenging aspects in the internet and network applications. Cryptography is the one of the main categories of computer security that converts information from its normal form into an unreadable form. The... more
    • by 
    •   5  
      CryptographyEncryptionAESDes
    • by 
    •   9  
      Computer ScienceComputer EngineeringComputer SecurityCryptography
    • by 
    •   3  
      Environmental EngineeringCivil EngineeringDes
    • by 
    •   11  
      EngineeringFace DetectionSystem on ChipAES
    • by 
    •   26  
      Environmental EngineeringCivil EngineeringOrdinary Differential EquationsMethodology
    • by 
    •   17  
      Web ApplicationsCryptographyWireless networksAuthentication
    • by 
    •   9  
      Computer ScienceInformation SecurityNetwork SecurityComputer Security
Security is playing a vital role in the field of communication system and Internet. Data encryption standard (DES) and the Rivest-Shamir-Adleman (RSA) algorithms are the two popular encryption algorithms that vouch confidentiality and... more
    • by 
    •   12  
      Computer ScienceCryptographyEncryptionRSA
    • by 
    •   13  
      EngineeringComputer ScienceTechnologyInformation Security
    • by 
    •   8  
      Computer ScienceFPGACryptographyResource use
Cloud Computing becomes the next generation architecture of IT Enterprise. In contrast to traditional solutions, Cloud computing moves the application software and databases to the large data centers, where the management of the data and... more
    • by 
    •   19  
      Computational ModelingData ManagementCryptographyEncryption
    • by 
    •   14  
      Computer ScienceSAT Solver DesignKey wordsAES
    • by 
    •   7  
      CryptographyVisual CryptographyStegnographyDes
... représentée par des assemblages lithiques à bifaces et débitage Levallois, taillés dans des matières premières (comme le silex ou le ... La circulation de différents produits sur de longues distances est une caractéristique de la... more
    • by 
    •   2  
      Bronze AgeDes
    • by 
    •   20  
      Environmental EngineeringCivil EngineeringComputer ScienceTime Series
    • by 
    •   7  
      Environmental EngineeringCivil EngineeringSurface WaterData Exchange
Terdapat beberapa cara untuk menangani masalah keamanan data rahasia yang dikirimkan melalui internet, diantaranya adalah menggunakan teknik kriptografi dan steganografi. Steganografi merupakan ilmu dan seni penyembunyian informasi/pesan... more
    • by 
    •   5  
      DesSteganografiEnd of FileEOF
The exponential increase in digital data exchange in Mobile Ad hoc network paves a way for authentic research in the horizon of securing data using cryptographic methods. This paper proposes a comparative analysis of existing DES and... more
    • by 
    •   5  
      ManetFingerprintMinutiaeDes
Trust of Clients cannot be completely trusted or beneficial through the cloud. Many information gets corrupted due to the unwanted users by the employees in the hierarchy of an Organization. Separate Organization handles the data... more
    • by 
    •   3  
      AESCloudDes
    • by 
    •   26  
      Environmental EngineeringCivil EngineeringOrdinary Differential EquationsMethodology
... La Hague, Mouton : 382-390. ... Geneviève Calame-Griaule, Claude-Hélène Perrot et Laure Carbonnel, « In memoriam Claude Tardits (18 avril 1921-1er mai 2007) », Journal des africanistes [En ligne], 77-1 | 2007, mis en ligne le 04... more
    • by 
    • Des
    • by 
    •   4  
      FPGACircuits and SystemsCryptographyDes
The watermarking of digital image, audio, video and multimedia products in general have been proposed for resolving copyright ownership and verifying boldness of content. This paper studies the contribution of watermarking for developing... more
    • by 
    •   6  
      Digital WatermarkingDesCopyright ProtectionSvd (singular Value Decomposition)
Digital data is increasing exponentially with the use of computational electronic devices, resulted in marking data with different types of formats. When it comes to the handling of the data by other end user, it becomes tedious as... more
    • by 
    •   7  
      XMLTcp/IpCryptographyRDF
    • by 
    •   8  
      Computer ScienceInformation SecurityComputer SecurityCryptography