Results 21 to 30 of about 2,666,306 (147)

Design and Implementation of Rivest Shamir Adleman’s (RSA) Cryptography Algorithm in Text File Data Security

open access: yesJournal of Physics: Conference Series, 2020
Security of data text file on a computer can be done by utilizing encryption and decryption techniques. One technique is encryption and decryption of data encryption system text file with cryptography.
Hengki Tamando Sihotang   +3 more
semanticscholar   +1 more source

Internet of things based hybrid cryptography for process data security

open access: yesJournal of Mathematics and Computer Science, 2020
This manuscript addresses security issues, security mechanisms of Internet of Things (IoT) and implementation of hybrid cryptography for preserving the process information against unauthorized access and modification.
J. S. Prasath   +3 more
semanticscholar   +1 more source

Rancang Bangun Aplikasi Keamanan Data Menggunakan Metode AES pada Smartphone [PDF]

open access: yes, 2017
Cryptography is one technique used to improve the security aspects of information. Cryptography is the study of science and art to maintain a message or data information so that the data is safe.
Hasibuan, A. M. (Amir)
core   +2 more sources

Cyber Security Incident Handling, Warning and Response System for the European Critical Information Infrastructures (CyberSANE) [PDF]

open access: yesEngineering Applications of Neural Networks -20th International Conference (EANN2019) Proceedings. Communications in Computer and Information Science (vol.1000) 476-487 Springer Cham, 2020
This paper aims to enhance the security and resilience of Critical Information Infrastructures (CIIs) by providing a dynamic collaborative, warning and response system (CyberSANE system) supporting and guiding security officers and operators (e.g. Incident Response professionals) to recognize, identify, dynamically analyse, forecast, treat and respond ...
arxiv   +1 more source

Study on Cryptography and its Techniques

open access: yesInternational Journal of Advanced Research in Science, Communication and Technology, 2021
In the modern era evaluation of networking and wireless networks has come in information and communication technology, there are so many things that give facility to deal with these technologies using the internet.
Abhishek V Doddagoudra   +2 more
semanticscholar   +1 more source

CSC669 - Cryptographic Algorithms / College of Computing, Informatics and Media [PDF]

open access: yes, 2021
Cryptography plays a key role in ensuring the privacy and integrity of data and the security of computer networks. The course will provide an overview of an introductory level of cryptography written from a modern, computer science perspective.
UiTM, College of Computing, Informatics and Media
core  

DNA Encoded Elliptic Curve Cryptography System for IoT Security

open access: yes, 2023
In the field of Computer Science and Information Technology Internet of Things (IoT) is one of the emerging technologies. In IoT environment several devices are interconnected and transmit data among them.
Barmana, Prokash, Saha, Banani
core  

Proceedings 11th Doctoral Workshop on Mathematical and Engineering Methods in Computer Science [PDF]

open access: yesEPTCS 233, 2016, 2016
MEMICS provides a forum for doctoral students interested in applications of mathematical and engineering methods in computer science. Besides a rich technical programme (including invited talks, regular papers, and presentations), MEMICS also offers friendly social activities and exciting opportunities for meeting like-minded people. MEMICS submissions
arxiv   +1 more source

On (Subgame Perfect) Secure Equilibrium in Quantitative Reachability Games [PDF]

open access: yesLogical Methods in Computer Science, Volume 9, Issue 1 (February 28, 2013) lmcs:790, 2012
We study turn-based quantitative multiplayer non zero-sum games played on finite graphs with reachability objectives. In such games, each player aims at reaching his own goal set of states as soon as possible. A previous work on this model showed that Nash equilibria (resp. secure equilibria) are guaranteed to exist in the multiplayer (resp. two-player)
arxiv   +1 more source

Evaluation of the use of web technology by government of Sri Lanka to ensure food security for its citizens [PDF]

open access: yesProcedia Food Science,Volume 6, 2016, Pages 82_91, International Conference of Sabaragamuwa University of Sri Lanka 2015 (ICSUSL 2015), 2016
Web technology is one of the key areas in information and communication technology to be used as a powerful tool in ensuring food security which is one of the main issues in Sri Lanka. Web technology involves in communicating and sharing resources in network of computers all over the world.
arxiv   +1 more source

Home - About - Disclaimer - Privacy