Results 11 to 20 of about 2,666,306 (147)

A Review Paper on Network Security and Cryptography

open access: yesInternational Journal of Advanced Research in Science, Communication and Technology, 2022
Organizations all over the globe create a tremendous quantity of data on a daily basis since the birth of the World Wide Web and the rise of ecommerce apps and social networks.
Mr. Pradeep V   +3 more
semanticscholar   +1 more source

Enhanced Security: Implementation of Hybrid Image Steganography Technique using Low-Contrast LSB and AES-CBC Cryptography

open access: yesInternational Journal of Advanced Computer Science and Applications, 2022
—Now-a-days, sensitive and confidential information needs to be exchanged over open, public, and not secure networks such as the Internet. For this purpose, some information security techniques combine cryptographic and steganographic algorithms and ...
E. G., Holman Montiel A, F. S.
semanticscholar   +1 more source

A Hybrid Encryption Solution to Improve Cloud Computing Security using Symmetric and Asymmetric Cryptography Algorithms

open access: yesInternational Journal of Advanced Computer Science and Applications, 2021
—Ensuring the security of cloud computing is one of the most critical challenges facing the cloud services sector. Dealing with data in a cloud environment, which uses shared resources, and providing reliable and secure cloud services, requires a robust ...
Hossein Abroshan
semanticscholar   +1 more source

A Survey on Blockchain Technology Concepts, Applications and Security

open access: yesInternational Journal of Advanced Computer Science and Applications, 2023
—In the past decade, blockchain technology has become increasingly prevalent in our daily lives. This technology consists of a chain of blocks that contains the history of transactions and information about its users. Distributed digital ledgers are used
Asma M. Alqahtani, Abdulmohsen Algarni
semanticscholar   +1 more source

Design and Evaluation to Calculate the Performance of Hybrid Cryptography to make Secure Transaction over Network [PDF]

open access: yes, 2021
Nowadays, the use of internet are growing increasingly across the world, security becomes a prime concern of issue for the society. Earlier security was a major issue for military applications but now the area of applications has been enhanced since most
et.al, Anup Bhange,
core   +2 more sources

Security Impact Analysis of Degree of Field Extension in Lattice Attacks on Ring-LWE Problem

open access: yes, 2023
Modern information communications use cryptography to keep the contents of communications confidential. RSA (Rivest-Shamir-Adleman) cryptography and elliptic curve cryptography, which are public-key cryptosystems, are widely used cryptographic schemes ...
Direbieski, Yuri Lucas   +5 more
core   +1 more source

Implementasi Algoritma Caesar Chiper dan Rail Fence untuk Peningkatan Keamanan Teks Berbasis Client Server [PDF]

open access: yes, 2022
SMK Negeri 3 Bengkulu City is one of the vocational schools in Bengkulu City. The school has a major in Computer and Network Engineering (TKJ). Students will be taught about basic knowledge in computers, network infrastructure, network security and ...
Aspriyono, Hari   +2 more
core   +2 more sources

Gaming security by obscurity [PDF]

open access: yes, 2011
Shannon sought security against the attacker with unlimited computational powers: *if an information source conveys some information, then Shannon's attacker will surely extract that information*.
Pavlovic, Dusko
core   +5 more sources

Using Process Models to understand Security Standards [PDF]

open access: yesInternational Conference on Current Trends in Theory and Practice of Informatics SOFSEM 2021: Theory and Practice of Computer Science pp 458-471, 2021
Many industrial software development processes today have to comply with security standards such as the IEC~62443-4-1. These standards, written in natural language, are ambiguous and complex to understand. This is especially true for non-security experts.
arxiv   +1 more source

Solving discrete logarithms on a 170-bit MNT curve by pairing reduction [PDF]

open access: yes, 2016
Pairing based cryptography is in a dangerous position following the breakthroughs on discrete logarithms computations in finite fields of small characteristic.
A Commeine   +33 more
core   +5 more sources

Home - About - Disclaimer - Privacy