Results 1 to 10 of about 299,742 (318)

A Modification on Key Stream Generator for RC4 Algorithm [PDF]

open access: yesEngineering and Technology Journal, 2020
Rivest Cipher 4 (RC4) is one of most common stream cipher, but it experience many problem, such as, there is little combination between the plaintext and cipher-text. For this reason RC4 Cipher is vulnerable to a number of attacks.
Suhad Kareem, Abdul Monem Rahma
doaj   +1 more source

Sound Computational Interpretation of Formal Encryption with Composed Keys [PDF]

open access: yes, 2003
The formal and computational views of cryptography have been related by the seminal work of Abadi and Rogaway. In their work, a formal treatment of encryption that uses atomic keys is justified in the computational world.
Corin, R.J., Corin, R.J., Laud, P.
core   +18 more sources

Robust Encryption [PDF]

open access: yesJournal of Cryptology, 2010
We provide a provable-security treatment of "robust" encryption. Robustness means it is hard to produce a ciphertext that is valid for two different users. Robustness makes explicit a property that has been implicitly assumed in the past. We argue that it is an essential conjunct of anonymous encryption.
Abdalla, Michel   +2 more
openaire   +4 more sources

The Use of Template Miners and Encryption in Log Message Compression

open access: yesComputers, 2021
Presently, almost every computer software produces many log messages based on events and activities during the usage of the software. These files contain valuable runtime information that can be used in a variety of applications such as anomaly detection,
Péter Marjai   +2 more
doaj   +1 more source

Healthchain: A Privacy Protection System for Medical Data Based on Blockchain

open access: yesFuture Internet, 2021
Recently, with the great development of e-health, more and more countries have made certain achievements in the field of electronic medical treatment. The digitization of medical equipment and the structuralization of electronic medical records are the ...
Baocheng Wang, Zetao Li
doaj   +1 more source

Secure Data Exchange in M-Learning Platform using Adaptive Tunicate Slime-Mold-Based Hybrid Optimal Elliptic Curve Cryptography

open access: yesApplied Sciences, 2021
The utilization of mobile learning continues to rise and has attracted many organizations, university environments and institutions of higher education all over the world.
Ghadah Aldabbagh   +5 more
doaj   +1 more source

A Secure Steganographic Channel Using DNA Sequence Data and a Bio-Inspired XOR Cipher

open access: yesInformation, 2021
Secure communication is becoming an urgent need in a digital world where tera bytes of sensitive information are sent back and forth over public networks.
Amal Khalifa
doaj   +1 more source

A Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies

open access: yesIEEE Access, 2021
Cloud computing has become a widely exploited research area in academia and industry. Cloud computing benefits both cloud services providers (CSPs) and consumers.
Bader Alouffi   +5 more
doaj   +1 more source

Mobility Prediction-Based Optimisation and Encryption of Passenger Traffic-Flows Using Machine Learning

open access: yesSensors, 2020
Information and Communication Technology (ICT) enabled optimisation of train’s passenger traffic flows is a key consideration of transportation under Smart City planning (SCP).
Syed Muhammad Asad   +5 more
doaj   +1 more source

The Effect of Using Cryptology on Understanding of Function Concept

open access: yesInternational Journal of Contemporary Educational Research, 2022
The aim of the study is to teach the concept of function by using cryptology and to examine whether it provides support to students who have difficulty in integrating this subject into daily life.
Ramazan EROL, Elif SAYGI
doaj   +1 more source

Home - About - Disclaimer - Privacy