Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Protecting passwords is now a big challenge because users want to do all types of work online via user-friendly devices such as mobile, tablets etc. Now, It is difficult to implement the secure heavy weight algorithms such as AES, RSA... more
    • by 
    •   6  
      MD5MACAuthentication ProtocolsSecurity Algorithms
We defined the hash algorithm as a security object during data transmission. The hash features are 4 more types 1. Message digest (MD5) 2. RIPMED (Race Integrated primitivity of Message Digest) 3. SHA (Secured Hash Function) 4. WHIRLPOOL.... more
    • by 
    •   5  
      FPGAThroughputMD5Hash Function
    • by  and +1
    •   7  
      Information SecurityComputer SecurityCryptographyAnalysis
Cloud computing has grown very quickly to become a promising business idea in the IT industry due to its characteristics such as cost reduction, flexibility, convenience, and scalability. The wide spread of Cloud Computing was accompanied... more
    • by 
    •   18  
      PrivacyComputer SecurityCryptographyEncryption
MD5 atau Message-Digest algortihm 5 adalah salah satu aplikasi yang digunakan untuk mengetahui bahwa pesan yang dikirim tidak ada perubahan sewaktu berada di jaringan. Algoritma MD-5 secara garis besar adalah mengambil pesan yang... more
    • by 
    •   5  
      The InternetSteganographyMD5Jaringan Komputer
    • by 
    •   8  
      Computer ScienceImage ProcessingCryptographyEncryption
    • by  and +1
    •   3  
      MD5RSA ALGORITHMMessage Digest 5 Algorithm
Sekarang ini hampir setiap orang menggunakan internet dan dunia maya. Sehingga tidak menutup kemungkinan banyak pihak untuk melakukan kejahatan internet mulai dari melihat data yang sangat rahasia, merubah data, atau bahkan menghapus data... more
    • by 
    •   2  
      MD5Enkripsi Md5
The BitTorrent protocol should (in the long run) be overseen by the International Telecommunications Union (ITU), in the capacity of providing "a framework for documenting the protocol state machines" (Client to Client, Client to Tracker... more
    • by 
    •   11  
      Distributed ComputingBitTorrent ProtocolMD5TCP variants
This study was conducted to determine the authenticity of a certificate quickly. Certificate forgery problem is one of the important aspects of a study that has been done. In this case, it is related to the importance of the authenticity... more
    • by 
    •   6  
      MD5HashingIdentifikasiAdvanced Encryption Standards
    • by 
    •   11  
      Computer ScienceInformation SecuritySecurityDigital Signature
We defined the hash algorithm as a security object during data transmission. The hash features are 4 more types 1. Message digest (MD5) 2. RIPMED (Race Integrated primitivity of Message Digest) 3. SHA (Secured Hash Function) 4. WHIRLPOOL.... more
    • by 
    •   5  
      FPGAThroughputMD5Hash Function
The paper introduces a cloud-enabled framework for parameterized security in large-scale Smartphone based wireless sensor network. The research work also highlights some of the effective implementation of service broker included in... more
    • by 
    •   7  
      Cloud ComputingAndroidCloud SecurityMD5
— Multi cloud is an important concept for these days for the organization people who do on-line method. It provides information to the user through cloud computing technology. User of the Cloud need to store sizable amount of knowledge... more
    • by 
    •   9  
      Computer ScienceCryptographyKey ManagementMD5
Cloud computing is recently emerged as a service program, where users can remotely depot their data into the cloud so as to take advantage of on-demand high quality services from a shared pool of configurable computing resources. Cloud... more
    • by 
    •   3  
      SecurityCloud ComputingMD5
We defined the hash algorithm as a security object during data transmission. The hash features are 4 more types 1. Message digest (MD5) 2. RIPMED (Race Integrated primitivity of Message Digest) 3. SHA (Secured Hash Function) 4. WHIRLPOOL.... more
    • by 
    •   5  
      FPGAThroughputMD5Hash Function
    • by 
    • MD5
— Cloud computing is one of the emerging technology which is showing continuous advancement in the field of networking. Cloud computing is defined by National Institute of Standards and Technology (NIST)[1] as a model for enabling... more
    • by 
    •   5  
      Computer ScienceCryptographyCloud ComputingCSP
Setiap hari ada penambahan ribuan varian virus baik buatan lokal maupun luar negeri. Virus/worm komputer lokal sendiri tidak bisa dibersihkan oleh beberapa antivirus produk luar negeri secara tuntas karena virus/worm komputer lokal tidak... more
    • by 
    •   3  
      HeuristicsMD5Antivirus
Pengertian enkripsi data tentang MD5, End-To-End dan Fungsi Sealer Sender Pada Signal
    • by 
    •   2  
      MD5Enkripsi
    • by 
    • MD5
Abstract Cryptography plays main role in information security, which is used to protect transformation of electronic data. Advanced Encryption Standard (AES) is symmetric block cipher that includes generation of ciphers for encryption... more
    • by 
    •   4  
      FPGAMD5PN SEQUENCE BY LFSR USING VHDLMulti-layer AES Key
    • by 
    •   6  
      Digital SignatureEncryptionECCMD5
    • by 
    •   7  
      Digital SignatureEncryptionNetworkingECC