Results 1 to 10 of about 264,588 (256)
A novel original procedure of encryption/decryption based on the polyadic algebraic structures and on signal processing methods is proposed. First, we use signals with integer amplitudes to send information.
Steven Duplij, Qiang Guo
doaj +3 more sources
On Using Encryption Techniques to Enhance Sticky Policies Enforcement [PDF]
How to enforce privacy policies to protect sensitive personal data has become an urgent research topic for security researchers, as very little has been done in this field apart from some ad hoc research efforts.
Tang, Qiang
core +18 more sources
A Modification on Key Stream Generator for RC4 Algorithm [PDF]
Rivest Cipher 4 (RC4) is one of most common stream cipher, but it experience many problem, such as, there is little combination between the plaintext and cipher-text. For this reason RC4 Cipher is vulnerable to a number of attacks.
Suhad Kareem, Abdul Monem Rahma
doaj +1 more source
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Abdalla, Michel +2 more
openaire +2 more sources
A Novel Data Encryption Algorithm To Ensure Database Security
Many people apply technologies gradually, moving towards new progress and development. Moreover, many of us utilize database systems to assist our work management; the database contains our work or personal information, which increases the risk of losing
Sivan İbrahim +4 more
doaj +1 more source
The Use of Template Miners and Encryption in Log Message Compression
Presently, almost every computer software produces many log messages based on events and activities during the usage of the software. These files contain valuable runtime information that can be used in a variety of applications such as anomaly detection,
Péter Marjai +2 more
doaj +1 more source
Applications of attack mitigation mechanisms in energy networks, attack detection and preventive methods for security in the smart grid [PDF]
The Smart Grid promotes energy and environmental sustainability through the integration of vast distributed energy resources. The implementation of such a green system has huge economic and social benefits.
Simeonidis Dimitrios
doaj +1 more source
Implementation of super H-antimagic total graph on establishing stream cipher
This paper is aimed to study the use of super (a, d)-H antimagic total graph on generating encryption keys that can be used to establish a stream cipher. Methodology to achieve this goal was undertaken in three steps. First of all the existence of super (
Antonius Cahya Prihandoko +2 more
doaj +1 more source
The Effect of Using Cryptology on Understanding of Function Concept
The aim of the study is to teach the concept of function by using cryptology and to examine whether it provides support to students who have difficulty in integrating this subject into daily life.
Ramazan EROL, Elif SAYGI
doaj +1 more source
Affine Determinant Programs: A Framework for Obfuscation and Witness Encryption [PDF]
An affine determinant program ADP: {0,1}^n → {0,1} is specified by a tuple (A,B_1,...,B_n) of square matrices over F_q and a function Eval: F_q → {0,1}, and evaluated on x \in {0,1}^n by computing Eval(det(A + sum_{i \in [n]} x_i B_i)).
Bartusek, James +5 more
core +2 more sources

