Results 1 to 10 of about 286,982 (344)

A Compression Algorithm for DNA Palindrome Compression Technique [PDF]

open access: yesITM Web of Conferences, 2020
Data Compression in Cryptography is one of the interesting research topic. The compression process reduces the amount of transferring data as well as storage space which in turn effects the usage of bandwidth.
Suneetha D.   +2 more
doaj   +1 more source

Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone

open access: yesIEEE Access, 2021
With the rapid miniaturization in sensor technology, ruddervator, arduino, and multi-rotor system, drone technology has fascinated researchers in the field of network security.
Saeed Ullah Jan, Habib Ullah Khan
doaj   +1 more source

Robust Encryption [PDF]

open access: yesJournal of Cryptology, 2010
We provide a provable-security treatment of "robust" encryption. Robustness means it is hard to produce a ciphertext that is valid for two different users. Robustness makes explicit a property that has been implicitly assumed in the past. We argue that it is an essential conjunct of anonymous encryption.
Abdalla, Michel   +2 more
openaire   +7 more sources

Database Encryption [PDF]

open access: yes, 2023
International ...
Anciaux, Nicolas   +2 more
openaire   +3 more sources

Development and Analysis of Symmetric Encryption Algorithm Qamal Based on a Substitution-permutation Network [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2021
This paper represents a developed cryptographic information protection algorithm based on a substitutionpermutation network. We describe the cryptographic transformations used in the developed algorithm.
Rustem G. Biyashev   +5 more
doaj   +1 more source

Cryptography in Qajar Period Passing Through the Traditional Cryptography to the Modern One [PDF]

open access: yesتاریخ نگری و تاریخ نگاری, 2019
There have been encrypted connections among human societies for sending confidential messages a long time ago. In the history of Iran also many encryption lines have been used by crypto-writers.
Samad Kavousi Rakati
doaj   +1 more source

Database Encryption [PDF]

open access: yes, 2011
Database encryption refers to the use of encryption techniques to transform a plain text database into a (partially) encrypted database, thus making it unreadable to anyone except those who possess the knowledge of the encryption key(s).
Bouganim, Luc, Guo, Yanli
openaire   +4 more sources

Matrično zasnovan algoritam za skrivanje tekstova i obradu informacija

open access: yesVojnotehnički Glasnik, 2014
Primena diferencijalne geometrije u skrivanju tekstualnih podataka prikazana je u ovom radu. Ta primena predstavlja generalizaciju prethodno predstavljenih metoda. Matrično vrednosne funkcije više promenljivih korišćene su u ovom radu.
Nenad O. Vesić, Dušan J. Simjanović
doaj   +1 more source

Generic Construction of Dual-Server Public Key Encryption With Keyword Search on Cloud Computing

open access: yesIEEE Access, 2020
Chen et al. indicated the inner keyword guessing attack coming from the low entropy of keywords, which eliminates the semantic security of most keyword search schemes.
Raylin Tso   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy