Results 61 to 70 of about 8,966,306 (229)

A Combination of SHA-256 and DES for Visual Data Protection

open access: yesJurnal Masyarakat Informatika
This study employs SHA-256 and DES algorithms to safeguard visual data through encryption and decryption processes. Research findings demonstrate that this method provides robust security with image histograms that are difficult to recognize and randomly
Aristides Bima Wintaka   +3 more
doaj   +1 more source

Business process analysis of university admissions: Combining TM Forum’s eTOM framework, discrete-event simulation, and queuing theory

open access: yesDiscrete and Continuous Models and Applied Computational Science
The increasing complexity of university admissions requires efficient, standardized processes to manage large volumes of applications and changing regulatory requirements. To address this, the paper applies the TM Forum’s Business Process Framework (eTOM)
Konstantin M. Terentyev   +3 more
doaj   +1 more source

Linear Cryptanalysis Method for DES Cipher

open access: yesInternational Conference on the Theory and Application of Cryptographic Techniques, 1994
M. Matsui
semanticscholar   +1 more source

de

open access: yesMeteorologische Zeitschrift, 1997
Referate lang, S. Emeis
openaire   +3 more sources

Home - About - Disclaimer - Privacy