Results 31 to 40 of about 2,666,306 (147)

Quantum Cryptography for the Future Internet and the Security Analysis

open access: yesSecur. Commun. Networks, 2018
Cyberspace has become the most popular carrier of information exchange in every corner of our life, which is beneficial for our life in almost all aspects.
Tianqi Zhou   +4 more
semanticscholar   +1 more source

Modeling Network Security: Case Study of Email System [PDF]

open access: yesInternational Journal of Advanced Computer Science and Applications (IJACSA), Volume 11, Issue 3, March 2020, 2020
We study operational security in computer network security, including infrastructure, internal processes, resources, information, and physical environment. Current works on developing a security framework focus on a security ontology that contributes to applying common vocabulary, but such an approach does not assist in constructing a foundation for a ...
arxiv  

CRYPTOGRAPHIC SOUND SAFETY DATA WITH RC4 ALGORITHM [PDF]

open access: yes, 2019
Data security and confidentiality is one of the most important aspects in the field of communication, especially communication using computer media. One area of science used to secure data is cryptography. Cryptography is a science that uses mathematical
A Rahman, Muhdary, Theho, Harryanto
core   +1 more source

Ubic: Bridging the gap between digital cryptography and the physical world

open access: yes, 2014
Advances in computing technology increasingly blur the boundary between the digital domain and the physical world. Although the research community has developed a large number of cryptographic primitives and has demonstrated their usability in all ...
D.M. Freeman   +6 more
core   +1 more source

Improved RSA security using Chinese Remainder Theorem and Multiple Keys [PDF]

open access: yes, 2020
Now a days, have a great dependence on computer and network and the security of computer related to the whole world and everybody. Cryptography is the art and science of achieving security by encoding message to make them non readable, to secure data ...
Abdulkader, Hatem   +2 more
core   +1 more source

International Symposium on Mathematics, Quantum Theory, and Cryptography [PDF]

open access: yes
This open access book presents selected papers from International Symposium on Mathematics, Quantum Theory, and Cryptography (MQC), which was held on September 25-27, 2019 in Fukuoka, Japan.

core   +4 more sources

Analysis of the Security of BB84 by Model Checking [PDF]

open access: yes, 2010
Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols.
Azizi, Abdelmalek   +2 more
core   +2 more sources

Normalising Lustre Preserves Security [PDF]

open access: yesarXiv, 2021
The synchronous reactive data flow language LUSTRE is an expressive language, equipped with a suite of tools for modelling, simulating and model-checking a wide variety of safety-critical systems. A critical intermediate step in the formally certified compilation of LUSTRE involves translation to a well-behaved sub-language called "Normalised LUSTRE ...
arxiv  

Comparison between the RSA cryptosystem and elliptic curve cryptography [PDF]

open access: yes, 2010
In the globalization era, cryptography becomes more popular and powerful; in fact it is very important in many areas (i.e. mathematics, computer science, networks, etc).
Abdullah, Kamilah
core   +1 more source

Assumptions in Quantum Cryptography

open access: yes, 2014
Quantum cryptography uses techniques and ideas from physics and computer science. The combination of these ideas makes the security proofs of quantum cryptography a complicated task.
Beaudry, Normand J.
core   +1 more source

Home - About - Disclaimer - Privacy