Results 21 to 30 of about 66,192 (90)
Mobile Application Security Platforms Survey [PDF]
Nowadays Smartphone and other mobile devices have become incredibly important in every aspect of our life. Because they have practically offered same capabilities as desktop workstations as well as come to be powerful in terms of CPU (Central processing ...
Amen, Bakhtiar +2 more
core +1 more source
A Novel Latin Square Image Cipher
In this paper, we introduce a symmetric-key Latin square image cipher (LSIC) for grayscale and color images. Our contributions to the image encryption community include 1) we develop new Latin square image encryption primitives including Latin Square ...
Aaronson +45 more
core +1 more source
AES-CBC Software Execution Optimization
With the proliferation of high-speed wireless networking, the necessity for efficient, robust and secure encryption modes is ever increasing. But, cryptography is primarily a computationally intensive process.
Doma, Jayramsingh +2 more
core +1 more source
Risks and remedies in e-learning system
One of the most effective applications of Information and Communication Technology (ICT) is the emergence of E-Learning. Considering the importance and need of E-Learning, recent years have seen a drastic change of learning methodologies in Higher ...
Barik, Nikhilesh, Karforma, Sunil
core +1 more source
A Comparison of Cryptography Courses
The author taught two courses on cryptography, one at Duke University aimed at non-mathematics majors and one at Rose-Hulman Institute of Technology aimed at mathematics and computer science majors.
Holden, Joshua
core +1 more source
ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments [PDF]
The enforcement of security policies in outsourced environments is still an open challenge for policy-based systems. On the one hand, taking the appropriate security decision requires access to the policies.
Asghar, Muhammad Rizwan +3 more
core +1 more source
Password Cracking and Countermeasures in Computer Security: A Survey
With the rapid development of internet technologies, social networks, and other related areas, user authentication becomes more and more important to protect the data of the users.
Chao, Lidia S. +2 more
core
A novel image encryption framework using Wireworld cellular automaton and hybrid chaotic maps for enhanced security. [PDF]
Alabdullah B +6 more
europepmc +1 more source
Lightweight semantic compression visual cryptography for secure medical image transmission in IoT systems. [PDF]
Blesswin AJ +5 more
europepmc +1 more source
NFBC: an efficient FPGA based NFSR-oriented lightweight block cipher suitable for embedded system. [PDF]
Chatterjee R, Chakraborty R.
europepmc +1 more source

