Results 21 to 30 of about 78,722 (281)
Efektivitas Pesan Teks Dengan Cipher Substitusi, Vigenere Cipher, dan Cipher Transposisi
Penelitian ini bertujuan untuk mengetahui efektivitas suatu keamanan pesan berbasis teks dengan metode kriptografi klasik seperti Substitusi, Vigenere, dan Transposisi. Dengan penerapan metode kriptografi, diharapkan mampu untuk meminimalisasi terjadinya penyadapan terhadap pesan teks.
Nyoman Putra Sastra, M. Azman Maricar
openaire +3 more sources
A Lightweight Cipher Based on Salsa20 for Resource-Constrained IoT Devices
The Internet of Things (IoT) paradigm envisions a world where everyday things interchange information between each other in a way that allows users to make smarter decisions in a given context.
Evangelina Lara +3 more
doaj +1 more source
Quantitative Evaluation of Chaotic CBC Mode of Operation [PDF]
The cipher block chaining (CBC) block cipher mode of operation presents a very popular way of encrypting which is used in various applications. In previous research work, we have mathematically proven that, under some conditions, this mode of operation ...
Abidi, Abdessalem +4 more
core +3 more sources
Cows, clicks, ciphers, and satire
The social network game Farmville, which allows players to grow crops, raise animals, and produce a variety of goods, proved enormously successful within a year of its launch in 2009, attracting 110 million Facebook users.
Tom Tyler
doaj +1 more source
Authentication of data hiding using co-occurrence matrix [PDF]
This research is considered one of the steps aiming to deal with one of the most important challenges facing communicators via Internet, as a means for ensuring information security and verifying the authenticity and credibility of the received message ...
Melad saeed, Ghada thanoon
doaj +1 more source
«The black room» the Russian foreign Ministry against Napoleon
This article deals with the successful activity of the Russian Empire cryptographers against Napoleon and his troops. Also some organizational work aspects of interception of French army cipher messages are considered.
D. E. Larin
doaj +1 more source
The Importance of Creativity in the Sportification of Breakdance
Many historical works have attempted to reveal the process of the sportification of physical activity that originated in the eighteenth century. The process of sportification can be divided into three basic mechanisms: The institutionalization of ...
Zhi Yang, YuJie Bai, MingTao Wei
doaj +1 more source
ABSTRACT Pediatric gastroenteropancreatic neuroendocrine neoplasms (GEP‐NENs) are extremely rare and clinically heterogeneous. Management has largely been extrapolated from adult practice. This European Standard Clinical Practice Guideline (ESCP), developed by the EXPeRT network in collaboration with adult NEN experts, provides (adult) evidence ...
Michaela Kuhlen +23 more
wiley +1 more source
Using of tiny encryption algorithm in CAN-Bus communication
The rising costs of agriculture machine operation force manufacturers to look for solutions that simplify the machine operation to its users and increase user comfort.
M. Jukl, J. Čupera
doaj +1 more source
ABSTRACT Background Oral mucositis is a common and debilitating side effect of childhood cancer and stem cell transplant treatments. It affects the quality of life of children and young people (CYP) and places a strain on services. Photobiomodulation is recommended for oral mucositis prevention in international guidance but is poorly implemented in UK ...
Claudia Heggie +4 more
wiley +1 more source

