Results 1 to 10 of about 2,666,306 (147)

The relevance of introducing the basics of cryptography and the basics of information security in the school course in computer science

open access: bronzeManagement of Education, 2023
Актуальность данной темы обусловлена потребностью в специалистах в области информационной безопасности. Внедрение в школьный курс информатики основ криптографии может значительно повлиять на выбор профессии и качество специалистов в области защиты информации.
А.С. Зуфарова   +2 more
semanticscholar   +4 more sources

Enhancement of Program Outcomes for Cryptography and Network Security course using Alternate Assessment Tool: An approach towards outcome-based education

open access: yesJournal of Engineering Education Transformations, 2023
: Outcome-based education is being practiced across the globe to enhance the employability of the undergraduates by instilling certain domain-specific skills. Evaluation is key in measuring the leaning outcomes of students. Tools such as regular quizzes,
Namratha M, S. S., K. Sainath
semanticscholar   +1 more source

A Dynamic Four-Step Data Security Model for Data in Cloud Computing Based on Cryptography and Steganography

open access: yesItalian National Conference on Sensors, 2022
Cloud computing is a rapidly expanding field. It allows users to access computer system resources as needed, particularly data storage and computational power, without managing them directly.
Rose Adee, H. Mouratidis
semanticscholar   +1 more source

Usability and Security of Arabic Text-based CAPTCHA Using Visual Cryptography

open access: yesComputer systems science and engineering, 2022
Recently, with the spread of online services involving websites, attackers have the opportunity to expose these services to malicious actions. To protect these services, A Completely Automated Public Turing Test to Tell Computers and Humans Apart ...
Suliman A. Alsuhibany, Meznah Alquraishi
semanticscholar   +1 more source

A Hybrid Double Encryption Approach for Enhanced Cloud Data Security in Post-Quantum Cryptography

open access: yesInternational Journal of Advanced Computer Science and Applications, 2023
—Quantum computers and research on quantum computers are increasing due to the efficiency and speed required for critical applications. This scenario also kindles the vitality of data protection needed against threats from quantum computers.
Manjushree C V, N. N
semanticscholar   +1 more source

A Comparative Survey on Symmetric Key Encryption Techniques [PDF]

open access: yes, 2023
Nowadays, the use of internet are growing increasingly across the world, security becomes a prime concern of issue for the society. Earlier security was a major issue for military applications but now the area of applications has been enhanced since most
CH Venkata Navi,P.Sandeep Reddy,Md Ayub Khan
core   +2 more sources

Estimating the Role of Blockchain, Deep Learning and Cryptography algorithms in Cloud Security

open access: yesJournal of Trends in Computer Science and Smart Technology, 2022
Cloud network has become very popular in recent days due to its accessibility merits. The data stored in the cloud environment are accessible by the clients from any location.
H. Andi
semanticscholar   +1 more source

Cryptography & Network Security

open access: yesInternational Journal for Research in Applied Science and Engineering Technology, 2022
: Cryptography is the practice and study of techniques to secure communication in the presence of adversarial behavior. On the other hand, Network security is the set of rules and configurations designed to protect the integrity, confidentiality, and ...
Madhur Anil Borate   +4 more
semanticscholar   +1 more source

Principles of Security and Trust: 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings [PDF]

open access: yes, 2020
authentication; computer science; computer software selection and evaluation; cryptography; data privacy; formal logic; formal methods; formal specification; internet; privacy; program compilers; programming languages; security analysis ...

core   +1 more source

Home - About - Disclaimer - Privacy