Results 11 to 20 of about 70,954 (220)

Enhancement of Program Outcomes for Cryptography and Network Security course using Alternate Assessment Tool: An approach towards outcome-based education

open access: yesJournal of Engineering Education Transformations, 2023
: Outcome-based education is being practiced across the globe to enhance the employability of the undergraduates by instilling certain domain-specific skills. Evaluation is key in measuring the leaning outcomes of students. Tools such as regular quizzes,
Namratha M, S. S., K. Sainath
semanticscholar   +1 more source

A Dynamic Four-Step Data Security Model for Data in Cloud Computing Based on Cryptography and Steganography

open access: yesItalian National Conference on Sensors, 2022
Cloud computing is a rapidly expanding field. It allows users to access computer system resources as needed, particularly data storage and computational power, without managing them directly.
Rose Adee, H. Mouratidis
semanticscholar   +1 more source

Usability and Security of Arabic Text-based CAPTCHA Using Visual Cryptography

open access: yesComputer systems science and engineering, 2022
Recently, with the spread of online services involving websites, attackers have the opportunity to expose these services to malicious actions. To protect these services, A Completely Automated Public Turing Test to Tell Computers and Humans Apart ...
Suliman A. Alsuhibany, Meznah Alquraishi
semanticscholar   +1 more source

A Hybrid Double Encryption Approach for Enhanced Cloud Data Security in Post-Quantum Cryptography

open access: yesInternational Journal of Advanced Computer Science and Applications, 2023
—Quantum computers and research on quantum computers are increasing due to the efficiency and speed required for critical applications. This scenario also kindles the vitality of data protection needed against threats from quantum computers.
Manjushree C V, N. N
semanticscholar   +1 more source

Estimating the Role of Blockchain, Deep Learning and Cryptography algorithms in Cloud Security

open access: yesJournal of Trends in Computer Science and Smart Technology, 2022
Cloud network has become very popular in recent days due to its accessibility merits. The data stored in the cloud environment are accessible by the clients from any location.
H. Andi
semanticscholar   +1 more source

A Review Paper on Network Security and Cryptography

open access: yesInternational Journal of Advanced Research in Science, Communication and Technology, 2022
Organizations all over the globe create a tremendous quantity of data on a daily basis since the birth of the World Wide Web and the rise of ecommerce apps and social networks.
Mr. Pradeep V   +3 more
semanticscholar   +1 more source

Cryptography & Network Security

open access: yesInternational Journal for Research in Applied Science and Engineering Technology, 2022
: Cryptography is the practice and study of techniques to secure communication in the presence of adversarial behavior. On the other hand, Network security is the set of rules and configurations designed to protect the integrity, confidentiality, and ...
Madhur Anil Borate   +4 more
semanticscholar   +1 more source

Enhanced Security: Implementation of Hybrid Image Steganography Technique using Low-Contrast LSB and AES-CBC Cryptography

open access: yesInternational Journal of Advanced Computer Science and Applications, 2022
—Now-a-days, sensitive and confidential information needs to be exchanged over open, public, and not secure networks such as the Internet. For this purpose, some information security techniques combine cryptographic and steganographic algorithms and ...
E. G., Holman Montiel A, F. S.
semanticscholar   +1 more source

A Hybrid Encryption Solution to Improve Cloud Computing Security using Symmetric and Asymmetric Cryptography Algorithms

open access: yesInternational Journal of Advanced Computer Science and Applications, 2021
—Ensuring the security of cloud computing is one of the most critical challenges facing the cloud services sector. Dealing with data in a cloud environment, which uses shared resources, and providing reliable and secure cloud services, requires a robust ...
Hossein Abroshan
semanticscholar   +1 more source

A Survey on Blockchain Technology Concepts, Applications and Security

open access: yesInternational Journal of Advanced Computer Science and Applications, 2023
—In the past decade, blockchain technology has become increasingly prevalent in our daily lives. This technology consists of a chain of blocks that contains the history of transactions and information about its users. Distributed digital ledgers are used
Asma M. Alqahtani, Abdulmohsen Algarni
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy