Results 31 to 40 of about 58,616 (313)
Implementasi Algoritma Kriptografi RSA untuk Enkripsi dan Dekripsi Email
In the world of Internet nothing is really safe. There's always a gap in any application made. Likewise in email delivery. To minimize attacks on the data transmission is usually applied cryptography.
Albert Ginting+2 more
doaj +1 more source
Analysis Performance of Fast Image Encryption [PDF]
Perkembangan teknologi mengakibatkan peningkatan kebutuhan pengiriman data melalui media internet. Banyak pengiriman data yang membutuhkan keamanan dalam pengirimannya untuk berbagai keperluan.
Dailey, M. (Matthew)+1 more
core +3 more sources
Image Encryption Using Block Cipher Based Serpent Algorithm [PDF]
In an encryption scheme, the message or information, referred to as plaintext, is encrypted using an encryption algorithm, generating cipher textthat can only be read if decrypted.A proposal algorithm forimages protectionis depending on the block cipher ...
Yossra Hussain Ali+1 more
doaj +1 more source
Chaotic-Map Based Encryption for 3D Point and 3D Mesh Fog Data in Edge Computing
Recent decades have seen dramatic development and adoption of digital technology. This technological advancement generates a large amount of critical data that must be safeguarded.
K. R. Raghunandan+4 more
doaj +1 more source
Proposed Hybrid Approach of Stream Cipher base on Selector of Encryption operation and Key Symmetric translate [PDF]
A stream cipher is a method of encrypting text (to produce cipher text) in which a cryptographic key and algorithm are applied to each binary digit in a data stream, one bit at a time. This method is not much used in modern cryptography.
Alaa Kadim Farhan
doaj +1 more source
Encryption and decryption of tissue factor [PDF]
Tissue factor (TF) is a transmembrane cofactor that binds and promotes the catalytic activity of factor (F) VIIa. The TF/VIIa complex activates FX by limited proteolysis to initiate blood coagulation and helps provide the thrombin burst that is important for a stable thrombus. TF is present both in the extravascular compartment, where it functions as a
Vivien M. Chen, Philip J. Hogg
openaire +3 more sources
A Concealed Based Approach for Secure Transmission in Advanced Metering Infrastructure
The smart grid has an important subsystem known as the Advanced Metering Infrastructure (AMI), responsible for measuring customer consumption of electricity.
Otisitswe Kebotogetse+2 more
doaj +1 more source
Homomorphic Data Isolation for Hardware Trojan Protection
The interest in homomorphic encryption/decryption is increasing due to its excellent security properties and operating facilities. It allows operating on data without revealing its content.
Alanwar, Amr+4 more
core +1 more source
ROYALE: A Framework for Universally Composable Card Games with Financial Rewards and Penalties Enforcement [PDF]
While many tailor made card game protocols are known, the vast majority of those suffer from three main issues: lack of mechanisms for distributing financial rewards and punishing cheaters, lack of composability guarantees and little flexibility ...
A Barnett+16 more
core +2 more sources
Verifiable Decryption in the Head
In this work we present a new approach to verifiable decryption which converts a 2-party passively secure distributed decryption protocol into a 1-party proof of correct decryption. This leads to an efficient and simple verifiable decryption scheme for lattice-based cryptography, especially for large sets of ciphertexts; it has small size and ...
Gjøsteen, Kristian+4 more
openaire +5 more sources