Results 21 to 30 of about 77,534 (185)

Authentication of data hiding using co-occurrence matrix [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2012
This research is considered one of the steps aiming to deal with one of the most important challenges facing communicators via Internet, as a means for ensuring information security and verifying the authenticity and credibility of the received message ...
Melad saeed, Ghada thanoon
doaj   +1 more source

The Importance of Creativity in the Sportification of Breakdance

open access: yesFrontiers in Education, 2022
Many historical works have attempted to reveal the process of the sportification of physical activity that originated in the eighteenth century. The process of sportification can be divided into three basic mechanisms: The institutionalization of ...
Zhi Yang, YuJie Bai, MingTao Wei
doaj   +1 more source

A New Type of Cipher: DICING_csb [PDF]

open access: yes, 2007
In this paper, we will propose a new type of cipher named DICING_csb, which is derived from our previous stream cipher DICING. It has applied a stream of subkey and an encryption form of block ciphers, so it may be viewed as a combinative of stream ...
Li, An-Ping
core   +2 more sources

De novo variants of IRF2BPL result in developmental epileptic disorder

open access: yesOrphanet Journal of Rare Diseases
Background Pathogenic variants of the IRF2BPL gene have been reported to cause neurodevelopmental disorders; however, studies focused on IRF2BPL in zebrafish are limited.
Yong Wang   +8 more
doaj   +1 more source

12 Ciphers

open access: yes, 2020
Another prime mover in the development of computers was cryptography – and in particular the breaking of German military codes during the second world war. It was this activity which really led to the modern computer era.
openaire   +2 more sources

A Lightweight Cipher Based on Salsa20 for Resource-Constrained IoT Devices

open access: yesSensors, 2018
The Internet of Things (IoT) paradigm envisions a world where everyday things interchange information between each other in a way that allows users to make smarter decisions in a given context.
Evangelina Lara   +3 more
doaj   +1 more source

Algoritma Super Enkripsi (Affine Cipher dan Cipher Transposisi Grup Simetri) untuk Mengamankan Pesan Teks

open access: yesKubik, 2022
Kriptografi adalah ilmu yang mempelajari teknik-teknik matematika yang berhubungan dengan aspek keamanan informasi. Metode kriptografi yang digunakan untuk mengamankan pesan diantaranya adalah affine cipher dan cipher transposisi grup simetri.
Ilfi Nur Diana
doaj   +1 more source

FPGA Modeling and Optimization of a SIMON Lightweight Block Cipher

open access: yesSensors, 2019
Security of sensitive data exchanged between devices is essential. Low-resource devices (LRDs), designed for constrained environments, are increasingly becoming ubiquitous.
Sa’ed Abed   +3 more
doaj   +1 more source

Color Image Encryption Using Hybrid Method of Fractal-Based Key and Private XOR Key [PDF]

open access: yesKirkuk Journal of Science, 2018
The main idea of image encryption is to ensure secure transmitting it in the open network by transforming the image to not understandable form so that unauthorized person cannot decrypt and see it.
Faten H. MohammedSediq   +2 more
doaj   +1 more source

PERBANDINGAN PLAYFAIR CIPHER DENGAN 3D PLAYFAIR CIPHER PADA PENGAMANAN CITRA

open access: yesMajalah Ilmiah Matematika dan Statistika, 2021
The development of sending messages that are increasingly easy and sophisticated makes it easier for third parties to access or sabotage the contents of the message, so we need a science called cryptography to secure the message.
Rika Ayu Sukmawati   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy