Results 11 to 20 of about 124,770 (378)

Two-Layer Security Algorithms to Prevent Attacks on Data in Cyberspace

open access: yesApplied Sciences, 2022
The ratio at which the number of users is increasing in cloud computing, the same as the number of data destruction, has doubled. Various algorithms have been designed to secure cloud servers to prevent an attacker from attacking, but they cannot protect
Muhammad Nadeem   +7 more
doaj   +1 more source

Agonistic behavior of captive saltwater crocodile, crocodylus porosus in Kota Tinggi, Johor [PDF]

open access: yes, 2021
Agonistic behavior in Crocodylus porosus is well known in the wild, but the available data regarding this behavior among the captive individuals especially in a farm setting is rather limited. Studying the aggressive behavior of C.
Abdul-Latiff, Muhammad Abu Bakar   +6 more
core   +1 more source

KOMBINASI CAESAR CIPHER DAN REVERSE CIPHER BERDASARKAN CIPHER BLOCK CHAINING

open access: yesMajalah Ilmiah Matematika dan Statistika, 2021
Communication in the current era of globalization is very developed. Many applications that can be used to facilitate communication. However, because of this convenience, the security of the information contained in it will be more easily hacked by irresponsible people. Cryptography is the science or art for security message.
Maulidyah Lailatun Najah   +1 more
openaire   +3 more sources

The Subterranean 2.0 Cipher Suite

open access: yesIACR Transactions on Symmetric Cryptology, 2020
This paper presents the Subterranean 2.0 cipher suite that can be used for hashing, MAC computation, stream encryption and several types of authenticated encryption schemes. At its core it has a duplex object with a 257-bit state and a lightweight single-
J. Daemen   +3 more
semanticscholar   +1 more source

SLIM: A Lightweight Block Cipher for Internet of Health Things

open access: yesIEEE Access, 2020
Nowadays, there is a strong demand for increasing the protection of resource-constrained devices such as Radio frequency identification (RFID) systems. Current cryptographic algorithms are sufficient for high-resource desktop computers.
Bassam Aboushosha   +4 more
semanticscholar   +1 more source

Chosen-Plaintext Cryptanalysis of a Clipped-Neural-Network-Based Chaotic Cipher [PDF]

open access: yes, 2005
In ISNN'04, a novel symmetric cipher was proposed, by combining a chaotic signal and a clipped neural network (CNN) for encryption. The present paper analyzes the security of this chaotic cipher against chosen-plaintext attacks, and points out that this ...
B. Schneier   +5 more
core   +5 more sources

Privacy Protection Based on Stream Cipher for Spatiotemporal Data in IoT

open access: yesIEEE Internet of Things Journal, 2020
In the participatory sensing framework, privacy protection of the Internet of Things (IoT) is very important. In this article, cryptography-based methods are utilized to protect participants’ privacy information in unsecured network channels for dynamic ...
Tianen Liu   +5 more
semanticscholar   +1 more source

Deciphering a novel image cipher based on mixed transformed Logistic maps [PDF]

open access: yes, 2015
Since John von Neumann suggested utilizing Logistic map as a random number generator in 1947, a great number of encryption schemes based on Logistic map and/or its variants have been proposed. This paper re-evaluates the security of an image cipher based
Cheng, Ge   +4 more
core   +1 more source

Stratified Sampling to Define Levels of Petrographic Variation in Coal Beds: Examples from Indonesia and New Zealand

open access: yesIndonesian Journal on Geoscience, 2016
DOI: 10.17014/ijog.3.1.29-51Stratified sampling of coal seams for petrographic analysis using block samples is a viable alternative to standard methods of channel sampling and particulate pellet mounts.
Tim A. Moore
doaj   +1 more source

Cryptanalysis of a chaotic block cipher with external key and its improved version [PDF]

open access: yes, 2006
Recently, Pareek et al. proposed a symmetric key block cipher using multiple one-dimensional chaotic maps. This paper reports some new findings on the security problems of this kind of chaotic cipher: 1) a number of weak keys exists; 2) some important ...
Alvarez   +12 more
core   +2 more sources

Home - About - Disclaimer - Privacy