Results 11 to 20 of about 60,215 (284)

Comparative Study of Database Security In Cloud Computing Using AES and DES Encryption Algorithms

open access: yesJournal of Information Security and Cybercrimes Research, 2019
Security is consider as one of the largest part important aspects in daily computing. The security is important in cloud computing especially for data save in cloud because it have sensitivity and import data as well many user can access to same data ...
Nora Abdullah Al-gohany   +1 more
doaj   +1 more source

Security in Internet of Drones: A Comprehensive Review

open access: yesCogent Engineering, 2022
Unmanned Aerial Vehicles (UAVs), also called drones, are used for various applications with two basic classifications: civilian and military drones. Civilian drones are used for various applications like construction site monitoring, natural disaster ...
Snehal Samanth   +2 more
doaj   +1 more source

Secure and linear cryptosystems using error-correcting codes [PDF]

open access: yes, 2000
A public-key cryptosystem, digital signature and authentication procedures based on a Gallager-type parity-check error-correcting code are presented.
Cover T. M.   +9 more
core   +2 more sources

Image encryption system based on a nonlinear joint transform correlator for the simultaneous authentication of two users [PDF]

open access: yes, 2019
We propose a new encryption system based on a nonlinear joint transform correlator (JTC) using the information of two biometrics (one digital fingerprint for each user) as security keys of the encryption system.
Millán Garcia-Varela, M. Sagrario   +2 more
core   +2 more sources

Method of encrypting images based on two multidimensional chaotic systems using fuzzy logic

open access: yesРадіоелектронні і комп'ютерні системи, 2022
The subject of the study: it is proposed to develop a method of image encryption with pixel permutation implemented using fuzzy logic and Hainaut mapping, as well as diffusion, which is implemented using the Lorenz system. Study objectives: To propose an
Mykola Kushnir   +2 more
doaj   +1 more source

Non-transferable unidirectional proxy re-encryption scheme for secure social cloud storage sharing [PDF]

open access: yes, 2016
(c) 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works for resale or ...
Hao, Wei   +3 more
core   +1 more source

A Fast Text-to-Image Encryption-Decryption Algorithm for Secure Network Communication

open access: yesComputers, 2022
Data security is the science of protecting data in information technology, including authentication, data encryption, data decryption, data recovery, and user protection.
Noor Sattar Noor   +3 more
doaj   +1 more source

Efficient public-key cryptography with bounded leakage and tamper resilience [PDF]

open access: yes, 2016
We revisit the question of constructing public-key encryption and signature schemes with security in the presence of bounded leakage and tampering memory attacks.
A Faonio   +46 more
core   +2 more sources

Encrypted Shared Data Spaces [PDF]

open access: yes, 2008
The deployment of Share Data Spaces in open, possibly hostile, environments arises the need of protecting the confidentiality of the data space content.
A. Wood   +13 more
core   +2 more sources

Implementasi Algoritma Kriptografi RSA untuk Enkripsi dan Dekripsi Email

open access: yesJurnal Teknologi dan Sistem Komputer, 2015
In the world of Internet nothing is really safe. There's always a gap in any application made. Likewise in email delivery. To minimize attacks on the data transmission is usually applied cryptography.
Albert Ginting   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy