Results 21 to 30 of about 3,894,133 (310)

Optimization of PBKDF2 Using HMAC-SHA2 and HMAC-LSH Families in CPU Environment

open access: yesIEEE Access, 2021
Password-Based Key Derivation Function 2 (PBKDF2) is widely used cryptographic algorithm in order to generate secure keys to a password in various occasions. For example, it is used for file encryption and implementation of authentication systems, and so
Hojin Choi, Seog Chung Seo
doaj   +1 more source

Analysis of the financial condition as the dominant indicator of the financial security of enterprises

open access: yesHerald of Economics, 2023
Introduction. Today’s conditions once again prove that the activities of enterprises are influenced not only by economic factors, but also by political, social, demographic, medical, and informational factors.
N. Zhuk
semanticscholar   +1 more source

ANALYSIS OF RISKS IN THE FINANCIAL SECURITY MANAGEMENT SYSTEM OF BUSINESS ENTITIES

open access: yesFinancial and credit activity problems of theory and practice, 2023
Financial and economic activity is exposed to numerous systemic risks, which are a threat to the financial security of enterprises. The criterion for ensuring financial security is the appropriate level of the company's financial condition. The financial
Zenovii-Mykhailo Zadorozhnyy   +5 more
semanticscholar   +1 more source

End-to-End Post-Quantum Cryptography Encryption Protocol for Video Conferencing System Based on Government Public Key Infrastructure

open access: yesApplied System Innovation, 2023
Owing to the expansion of non-face-to-face activities, security issues in video conferencing systems are becoming more critical. In this paper, we focus on the end-to-end encryption (E2EE) function among the security services of video conferencing ...
Yeongjae Park   +5 more
doaj   +1 more source

THE MONETARY COMPONENT IN ENSURING THE FINANCIAL SECURITY OF THE STATE

open access: yesFinancial and credit activity problems of theory and practice, 2023
The paper studies the place and degree of the monetary component's influence on the level of financial security of the state in the conditions of political and socio-economic imbalances in the development of Ukraine.
V. Kovalenko   +4 more
semanticscholar   +1 more source

Fast Implementation of SHA-3 in GPU Environment

open access: yesIEEE Access, 2021
Recently, Graphic Processing Units (GPUs) have been widely used for general purpose applications such as machine learning applications, acceleration of cryptographic applications (especially, blockchains), etc.
Hojin Choi, Seog Chung Seo
doaj   +1 more source

Monitoring System for Regional Financial Security

open access: yesEconomy of Regions, 2023
A monitoring system for regional financial security based on a key set of indicators can be used to timely and promptly identify, analyse and assess security threats at the meso-level.
E. V. Karanina, M. Kyzyurov
semanticscholar   +1 more source

Recoverable Random Numbers in an Internet of Things Operating System

open access: yesEntropy, 2017
Over the past decade, several security issues with Linux Random Number Generator (LRNG) on PCs and Androids have emerged. The main problem involves the process of entropy harvesting, particularly at boot time.
Taeill Yoo, Ju-Sung Kang, Yongjin Yeom
doaj   +1 more source

Optimized Implementation of PIPO Block Cipher on 32-Bit ARM and RISC-V Processors

open access: yesIEEE Access, 2022
A lightweight block cipher PIPO-64/128 was presented in ICISC’2020. PIPO of the 8-bit unit using an unbalanced-bridge S-box showed better performance than other lightweight block cipher algorithms on an 8-bit AVR environment.
Youngbeom Kim, Seog Chung Seo
doaj   +1 more source

NATIONAL ENERGY SECURITY: FINANCIAL DETERMINANTS

open access: yesFinancial and credit activity problems of theory and practice, 2022
The snowballing economic growth has reached the level where the energy industry has a crucial impact on the future pace of development. National energy security influences the adequate performance of all economic spheres and stable government processes.
Tetyana Pimonenko   +3 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy