Results 1 to 10 of about 88,610 (249)

A Modification on Key Stream Generator for RC4 Algorithm [PDF]

open access: yesEngineering and Technology Journal, 2020
Rivest Cipher 4 (RC4) is one of most common stream cipher, but it experience many problem, such as, there is little combination between the plaintext and cipher-text. For this reason RC4 Cipher is vulnerable to a number of attacks.
Suhad Kareem, Abdul Monem Rahma
doaj   +1 more source

A Novel Data Encryption Algorithm To Ensure Database Security

open access: yesActa Infologica, 2023
Many people apply technologies gradually, moving towards new progress and development. Moreover, many of us utilize database systems to assist our work management; the database contains our work or personal information, which increases the risk of losing
Sivan İbrahim   +4 more
doaj   +1 more source

The Use of Template Miners and Encryption in Log Message Compression

open access: yesComputers, 2021
Presently, almost every computer software produces many log messages based on events and activities during the usage of the software. These files contain valuable runtime information that can be used in a variety of applications such as anomaly detection,
Péter Marjai   +2 more
doaj   +1 more source

Applications of attack mitigation mechanisms in energy networks, attack detection and preventive methods for security in the smart grid [PDF]

open access: yesE3S Web of Conferences
The Smart Grid promotes energy and environmental sustainability through the integration of vast distributed energy resources. The implementation of such a green system has huge economic and social benefits.
Simeonidis Dimitrios
doaj   +1 more source

Implementation of super H-antimagic total graph on establishing stream cipher

open access: yesIndonesian Journal of Combinatorics, 2019
This paper is aimed to study the use of super (a, d)-H antimagic total graph on generating encryption keys that can be used to establish a stream cipher. Methodology to achieve this goal was undertaken in three steps. First of all the existence of super (
Antonius Cahya Prihandoko   +2 more
doaj   +1 more source

Healthchain: A Privacy Protection System for Medical Data Based on Blockchain

open access: yesFuture Internet, 2021
Recently, with the great development of e-health, more and more countries have made certain achievements in the field of electronic medical treatment. The digitization of medical equipment and the structuralization of electronic medical records are the ...
Baocheng Wang, Zetao Li
doaj   +1 more source

Secure Data Exchange in M-Learning Platform using Adaptive Tunicate Slime-Mold-Based Hybrid Optimal Elliptic Curve Cryptography

open access: yesApplied Sciences, 2021
The utilization of mobile learning continues to rise and has attracted many organizations, university environments and institutions of higher education all over the world.
Ghadah Aldabbagh   +5 more
doaj   +1 more source

Mobility Prediction-Based Optimisation and Encryption of Passenger Traffic-Flows Using Machine Learning

open access: yesSensors, 2020
Information and Communication Technology (ICT) enabled optimisation of train’s passenger traffic flows is a key consideration of transportation under Smart City planning (SCP).
Syed Muhammad Asad   +5 more
doaj   +1 more source

A Secure Steganographic Channel Using DNA Sequence Data and a Bio-Inspired XOR Cipher

open access: yesInformation, 2021
Secure communication is becoming an urgent need in a digital world where tera bytes of sensitive information are sent back and forth over public networks.
Amal Khalifa
doaj   +1 more source

A Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies

open access: yesIEEE Access, 2021
Cloud computing has become a widely exploited research area in academia and industry. Cloud computing benefits both cloud services providers (CSPs) and consumers.
Bader Alouffi   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy