Results 31 to 40 of about 58,616 (313)

Implementasi Algoritma Kriptografi RSA untuk Enkripsi dan Dekripsi Email

open access: yesJurnal Teknologi dan Sistem Komputer, 2015
In the world of Internet nothing is really safe. There's always a gap in any application made. Likewise in email delivery. To minimize attacks on the data transmission is usually applied cryptography.
Albert Ginting   +2 more
doaj   +1 more source

Analysis Performance of Fast Image Encryption [PDF]

open access: yes, 2014
Perkembangan teknologi mengakibatkan peningkatan kebutuhan pengiriman data melalui media internet. Banyak pengiriman data yang membutuhkan keamanan dalam pengirimannya untuk berbagai keperluan.
Dailey, M. (Matthew)   +1 more
core   +3 more sources

Image Encryption Using Block Cipher Based Serpent Algorithm [PDF]

open access: yesEngineering and Technology Journal, 2016
In an encryption scheme, the message or information, referred to as plaintext, is encrypted using an encryption algorithm, generating cipher textthat can only be read if decrypted.A proposal algorithm forimages protectionis depending on the block cipher ...
Yossra Hussain Ali   +1 more
doaj   +1 more source

Chaotic-Map Based Encryption for 3D Point and 3D Mesh Fog Data in Edge Computing

open access: yesIEEE Access, 2023
Recent decades have seen dramatic development and adoption of digital technology. This technological advancement generates a large amount of critical data that must be safeguarded.
K. R. Raghunandan   +4 more
doaj   +1 more source

Proposed Hybrid Approach of Stream Cipher base on Selector of Encryption operation and Key Symmetric translate [PDF]

open access: yesEngineering and Technology Journal, 2011
A stream cipher is a method of encrypting text (to produce cipher text) in which a cryptographic key and algorithm are applied to each binary digit in a data stream, one bit at a time. This method is not much used in modern cryptography.
Alaa Kadim Farhan
doaj   +1 more source

Encryption and decryption of tissue factor [PDF]

open access: yesJournal of Thrombosis and Haemostasis, 2013
Tissue factor (TF) is a transmembrane cofactor that binds and promotes the catalytic activity of factor (F) VIIa. The TF/VIIa complex activates FX by limited proteolysis to initiate blood coagulation and helps provide the thrombin burst that is important for a stable thrombus. TF is present both in the extravascular compartment, where it functions as a
Vivien M. Chen, Philip J. Hogg
openaire   +3 more sources

A Concealed Based Approach for Secure Transmission in Advanced Metering Infrastructure

open access: yesIEEE Access, 2022
The smart grid has an important subsystem known as the Advanced Metering Infrastructure (AMI), responsible for measuring customer consumption of electricity.
Otisitswe Kebotogetse   +2 more
doaj   +1 more source

Homomorphic Data Isolation for Hardware Trojan Protection

open access: yes, 2015
The interest in homomorphic encryption/decryption is increasing due to its excellent security properties and operating facilities. It allows operating on data without revealing its content.
Alanwar, Amr   +4 more
core   +1 more source

ROYALE: A Framework for Universally Composable Card Games with Financial Rewards and Penalties Enforcement [PDF]

open access: yes, 2019
While many tailor made card game protocols are known, the vast majority of those suffer from three main issues: lack of mechanisms for distributing financial rewards and punishing cheaters, lack of composability guarantees and little flexibility ...
A Barnett   +16 more
core   +2 more sources

Verifiable Decryption in the Head

open access: yes, 2022
In this work we present a new approach to verifiable decryption which converts a 2-party passively secure distributed decryption protocol into a 1-party proof of correct decryption. This leads to an efficient and simple verifiable decryption scheme for lattice-based cryptography, especially for large sets of ciphertexts; it has small size and ...
Gjøsteen, Kristian   +4 more
openaire   +5 more sources

Home - About - Disclaimer - Privacy