Results 1 to 10 of about 2,666,306 (147)
Актуальность данной темы обусловлена потребностью в специалистах в области информационной безопасности. Внедрение в школьный курс информатики основ криптографии может значительно повлиять на выбор профессии и качество специалистов в области защиты информации.
А.С. Зуфарова+2 more
semanticscholar +4 more sources
: Outcome-based education is being practiced across the globe to enhance the employability of the undergraduates by instilling certain domain-specific skills. Evaluation is key in measuring the leaning outcomes of students. Tools such as regular quizzes,
Namratha M, S. S., K. Sainath
semanticscholar +1 more source
Cloud computing is a rapidly expanding field. It allows users to access computer system resources as needed, particularly data storage and computational power, without managing them directly.
Rose Adee, H. Mouratidis
semanticscholar +1 more source
Usability and Security of Arabic Text-based CAPTCHA Using Visual Cryptography
Recently, with the spread of online services involving websites, attackers have the opportunity to expose these services to malicious actions. To protect these services, A Completely Automated Public Turing Test to Tell Computers and Humans Apart ...
Suliman A. Alsuhibany, Meznah Alquraishi
semanticscholar +1 more source
A Hybrid Double Encryption Approach for Enhanced Cloud Data Security in Post-Quantum Cryptography
—Quantum computers and research on quantum computers are increasing due to the efficiency and speed required for critical applications. This scenario also kindles the vitality of data protection needed against threats from quantum computers.
Manjushree C V, N. N
semanticscholar +1 more source
A Comparative Survey on Symmetric Key Encryption Techniques [PDF]
Nowadays, the use of internet are growing increasingly across the world, security becomes a prime concern of issue for the society. Earlier security was a major issue for military applications but now the area of applications has been enhanced since most
CH Venkata Navi,P.Sandeep Reddy,Md Ayub Khan
core +2 more sources
Estimating the Role of Blockchain, Deep Learning and Cryptography algorithms in Cloud Security
Cloud network has become very popular in recent days due to its accessibility merits. The data stored in the cloud environment are accessible by the clients from any location.
H. Andi
semanticscholar +1 more source
Cryptography & Network Security
: Cryptography is the practice and study of techniques to secure communication in the presence of adversarial behavior. On the other hand, Network security is the set of rules and configurations designed to protect the integrity, confidentiality, and ...
Madhur Anil Borate+4 more
semanticscholar +1 more source
Principles of Security and Trust: 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings [PDF]
authentication; computer science; computer software selection and evaluation; cryptography; data privacy; formal logic; formal methods; formal specification; internet; privacy; program compilers; programming languages; security analysis ...
core +1 more source