Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Fondé sur une enquête ethnographique et sur des données quantitatives, cet article traite de la construction sociale du rapport à l’emploi chez des mères seules allocataires du Revenu de solidarité active. Celles-ci peuvent avoir du mal à... more
    • by 
    •   4  
      GenreRSAIntersectionnalitéEtat social
En este documento se explorará el método de factorización de números semiprimos a través del método de Conjuntos de Parábolas Concéntricas (𝐶𝑃𝐶). El documento realiza un análisis de datos a partir de varios conceptos iniciales, y va... more
    • by 
    •   6  
      Prime NumbersRSARSA ALGORITHMFactorización
En 2011, le rapport du Comité national d'évaluation du RSA (CNE) estime que 49% de bénéficiaires potentiels du RSA ne le demandent pas : 35% pour le RSA socle et 68% pour le RSA activité. On constate donc un important taux de non-recours... more
    • by 
    •   3  
      RSARevenu de solidarité active (RSA)Non-recours
    • by 
    •   9  
      Computer ScienceAlgorithmsInformation TechnologyNetwork Security
Cloud database are derivatives of Cloud computing. At present, most medical institutions store data in cloud database. Although the cloud database improves the efficiency of use, it also poses a huge impact and challenge to the secure... more
    • by 
    •   14  
      AestheticsData Warehousing and Data MiningBusiness Process Improvement, Data Quality Dimensions, Information Quality , Qualitative and Quantitative MethodologyRSA
Due to the rapid growth of online transactions on the Internet, authentication, non-repudiation and integrity are very essential security requirements for a secure transaction. To achieve these security goals, digital signature is the... more
    • by 
    •   6  
      Computer ScienceInformation SecurityDigital SignatureECDSA
    • by  and +1
    • RSA
Cryptography is the art and science of keeping massages secure. It is the study of techniques related to aspects of information security such as information privacy, integrity, authentication and non-repudiation. Cryptography is almost... more
    • by 
    •   8  
      Computer ScienceInformation SecurityComputer SecurityCryptography
With the major advancements in the field of technology and electronics, one persistent obstacle has proven to be one of the major challenges, namely : Data Security. To get connected securely and quickly through the electronic data... more
    • by 
    •   9  
      CryptographyEncryptionData SecurityScientific Publications
This paper reports about the survey of various techniques available in an encryption and also in compression technique. It is mainly analyzing the existing encoding and compressed cryptosystem together as a literature survey. It is also... more
    • by 
    •   5  
      RSARc4Arithmetic encodingBWT
To overcome the problems faced in symmetric key algorithms, people have chosen Asymmetric Key algorithms for communication. Communication with Asymmetric algorithms will give us transmission of information without exchanging the key.... more
    • by 
    •   4  
      CryptographyPublic Key Crypto systemsRSAElGamal Encryption Scheme
    • by 
    •   3  
      CryptographyRSADiffie-Hellman-DSA
PT. Kereta Api Indonesia (PT. KAI) is a government agency engaged in public transport services. Train tickets can only be purchased initially by conventional means (coming to the station) which resulted in a loss of potential passengers... more
    • by  and +1
    •   8  
      AndroidTicketAndroid DevelopmentRSA
Questo lavoro è diviso in due parti. Nella prima vi è uno studio dei concetti di privacy by design e by default introdotti col GDPR. Viene presentato uno strumento (questionario) in grado di analizzare la compliance al regolamento e... more
    • by 
    •   12  
      MathematicsMathematics of CryptographyPrivacyCryptography
    • by 
    • RSA
This report resumes my 6 months end-of-studies internship at Alcatel-Lucent International as an Ethical Hacker for connected objects in the Device IOT Excellence Center. It begins with briefly describing Alcatel-Lucent, its history,... more
    • by 
    •   32  
      Home automationPythonFactorization of large numbersEthical Hacking
Coba fikirkan hal apa yang tidak dapat diretas hari ini ? Apakah demikian juga halnya dahulu ? apakah esok dan masa depan kita masih akan terus mengalami semua kekacauan ini ? Coba jawab dalam diri anda berapa banyak informasi yang anda... more
    • by 
    •   31  
      Computer SecurityCryptographyPythonPublic Key Crypto systems
Odin Hjemdal, Antonio Roazzi, Maria da Graça B. B. Dias and Oddgeir Friborg Abstract Background: The resilience construct is of increasing interest in clinical and health psychology. The Resilience Scale for Adults (RSA) is a measure of... more
    • by 
    •   8  
      ResilienceResilience (Sustainability)Sense of Coherence (Antonovsky)Cross-Cultural Validation
With the major advancements in the field of technology and electronics, one persistent obstacle has proven to be one of the major challenges, namely : Data Security. To get connected securely and quickly through the electronic data... more
    • by 
    •   8  
      CryptographyEncryptionData SecurityRSA
Fog computing extends cloud computing to the edge of a network enabling new Internet of Things (IoT) applications and services, which may involve critical data that require privacy and security. In an IoT fog computing system, three... more
    • by 
    •   13  
      Computer NetworksPerformanceCryptographyECDSA
In current scenario everything is being transferred on the web and other communication medium. So that we need to make our data secure from all other attacker and unauthorized person. So that we have to give lot of protection to the... more
    • by 
    •   6  
      MrRSAMagic RectanglePublic Key Cryptosystem
Passwordless Login for Web Application' is an android application, will be used to access online internet accounts of distinct web applications and web services. The user would register with prerequisite credentials primarily like, an... more
    • by 
    •   5  
      SMSRSAQR CodeAndroid mobile phone
The following document will be overlooking the research carried out to develop a sales management system that will implement high end RSA encryption. The report consists of all the research carried out into the field of cybersecurity and... more
    • by 
    •   21  
      Web DesignDigital SignatureAccess ControlCryptography
    • by  and +1
    •   4  
      Football (soccer)Exercise ScienceRSARepeated Sprint Training
Kryptografie je velmi důležitým aspektem našeho každodenního života, protože poskytuje teoretický základ informační bezpečnosti. Kvantové výpočty a informace se také stávají velmi důležitou oblastí vědy kvůli mnoha aplikačním oblastem... more
    • by 
    •   5  
      Quantum ComputingCryptographyRSAFactorization
Public Key Infrastructure gives security limits on the association, for instance, encryption of data, an insistence that data are done and customer affirmation, by open key encryption, etc. PKI starts to be worked as a validation base on... more
    • by 
    •   4  
      PKI (Cryptography)RSADSA, Coase BArganing, Microwave Design and Fabricating CircuitsCryptography&authentication
Medical image security provides challenges and opportunities, watermarking and encryption of medical images provides the necessary control over the flow of medical information. In this paper a dual security approach is employed .A medical... more
    • by 
    •   7  
      GUIDeAESRSA
In this era of rapid technological development, critical prescriptive documents and personality information have begun to be stored in digital media. Increasing the importance of stored information has led to the development of security... more
    • by 
    •   7  
      AlgorithmsEğitimEngineering and Computer Science EducationRSA
In this paper, we consider an RSA modulus N=pq, where the prime factors p, q are of the same size. We present an attack on RSA when the decryption exponent d is in the form d=Md1+d0 where M is a given positive integer and d1 and d0 are... more
    • by 
    •   3  
      CryptanalysisRSAMatrix factorization
    • by 
    •   11  
      AlgebraChemistryInstructional DesignSoutheast Asian Studies
En este documento se pretende realizar un criptoanálisis (podríamos decir “una prueba de resistencia”) al sistema de cifrado RSA. Se empieza por definir cómo funciona el algoritmo a nivel funcional, y cómo funciona a nivel técnico. Una... more
    • by 
    •   6  
      CryptographyRSA encryptionRSARSA ALGORITHM
In today’s era, secure transmission of confidential data is of biggest concern. The encryption plays an important role in transmission of secure data. The encryption means converting the original data to cipher text. The main issue is... more
    • by 
    •   9  
      EncryptionAESRSARc6
Presently, mobile handheld device has successfully replaced traditional telephone to become the most popular wireless communication tools. Mobile Short Message Service (SMS) and Multimedia Message Service (MMS) fulfill almost all the user... more
    • by 
    •   12  
      Computer SciencePublic Key InfrastructureCryptographyHandheld Device Use
Cryptography plays an important role for data security and integrity and is widely adopted, especially in embedded systems. On one hand, we want to reduce the computation overhead of cryptography algorithms; on the other hand, we also... more
    • by 
    • RSA
Le discours sur la « fraude sociale » a marqué le quinquennat de Nicolas Sarkozy. Prétextant sauver la protection sociale des assistés et des tricheurs, ce discours a répandu l'idée que les droits économiques et sociaux se méritent et a... more
    • by 
    •   7  
      FraudeRSAPrécaritéPolitiques sociales
    • by 
    •   6  
      Computer ScienceComputer EngineeringSecurityCloud Computing
Cryptography is an art to manipulate a private message, especially for state security. One of the known methods to strengthen the secureness of a cryptography is by combining two existing cryptographies. A combination of two... more
    • by 
    •   5  
      CryptographyRSARSA ALGORITHMRsa Cryptography
The aim of this study is to investigate the bodily-self in Restrictive Anorexia, focusing on two basic aspects related to the bodily self: autonomic strategies in social behavior, in which others' social desirability features, and social... more
    • by 
    •   6  
      Implicit Social CognitionAnorexia NervosaAutonomic Nervous SystemRSA
    • by 
    •   5  
      CryptographyElliptic curve cryptography for encryption and digital signatureData SecurityRSA
Due to their use in daily life situation, demand for remote health applications and e-health monitoring equipment is growing quickly. In this phase, for fast diagnosis and therapy, information can be transferred from the patient to the... more
    • by 
    •   7  
      CryptographyAESRSADiffie–hellman
Data Security is the most important issue nowadays. A lot of cryptosystems are introduced to provide security. Public key cryptosystems are the most common cryptosystems used for securing data communication. The common drawback of... more
    • by 
    •   7  
      FPGARSAModular multiplicationCarry Save Adder
El presente trabajo tiene como objetivo el desarrollo de un sistema de en la cual se propone sistematizar el proceso de la redacción y generación de historiales médicos con los cuales se propone la reducción del tiempo de la generación de... more
    • by  and +2
    •   6  
      CriptografiaRSAFirma Digitalhistorial médico
Smart cards improve the convenience and security of any transaction. They provide tamper-proof storage of user and account identity. Multifunction cards are used to manage network system access, store value and other data. The cards carry... more
    • by 
    •   4  
      ECDSASmart CardsRSAPublic Key Cryptosystems
    • by 
    •   5  
      CryptographyManetRSAThreshold Cryptography
    • by 
    •   4  
      Wireless CommunicationsFPGAHardwareRSA
Public key cryptography has received great attention in the field of information exchange through insecure channels. In this paper, we combine the Dependent-RSA (DRSA) and chaotic maps (CM) to get a new secure cryptosystem, which depends... more
    • by  and +1
    •   5  
      CryptographyCryptanalysisChaotic MapsPublic key cryptography
    • by 
    •   6  
      EvaluationExperimentationRSAÉvaluation Des Politiques Publiques
    • by 
    •   11  
      PsychologyClinical PsychologySocial PsychologyDevelopmental Psychology
Pertukaran dokumen elektronik melalui jaringan publik global atau Internet menggunakan fasilitas email sudah luas digunakan sebagai transaksi komersial. Untuk menjamin dokumen elektronik tersebut masih utuh/otentik/tidak mengalami... more
    • by 
    •   3  
      Digital SignatureRSARSA ALGORITHM
SPI 2014: nº 1. Pietro Bembo (1470-1547) nació en Venecia en el seno de una familia perteneciente a la aristocracia. Su padre, prestigioso diplomático, bibliófilo y coleccionista de arte, mantuvo estrecho contacto con figuras destacadas... more
    • by 
    •   35  
      Comparative LiteratureTranslation StudiesRenaissance StudiesRenaissance Humanism