Results 101 to 110 of about 166,374 (227)
An Analisys of Business VPN Case Studies [PDF]
A VPN (Virtual Private Network) simulates a secure private network through a shared public insecure infrastructure like the Internet. The VPN protocol provides a secure and reliable access from home/office on any networking technology transporting IP ...
Crescenzio Gallo +2 more
core
Aspects of a Watermark Solution [PDF]
Although watermarking is a relatively new technology, there are many ways of applying it on an electronic data set with the purpose of ensuring copyright integrity and authenticity of the electronic data. But, bearing in mind the evolution of information
Crina RATIU +2 more
core
Implementasi Kriptografi Untuk Keamanan File Text Dengan Menggunakan Metode MD5
Ahmad Zaki Fadilla Rangkuti +1 more
openalex +1 more source
Research on the multi-message modification techniques on MD5
According to research on the message modification techniques presented by Wang Xiaoyun et al and the advanced message modification techniques proposed by Yu Sasaki et al, the multi-message modification techniques were founded to not be always able to ...
CHEN Shi-wei, JIN Chen-hui
doaj +2 more sources
A Review of Comparative Study of MD5 and SSH Security Algorithm
Surbhi Gupta, Neha Goyal, Kirti Aggarwal
openalex +1 more source
El presente artículo aborda de manera general algunas de las funciones resúmenes (hash) más empleadas en criptografía tales como MD5, SHA-1, RIPEMD y HAVAL, así como los algoritmos básicos de funcionamiento de cada una de ellas, su aplicación o uso y sus
Lic. Sandra Blain Escalona +1 more
doaj
В данной статье предлагается вариант модификации известной хэш-функции с целью повышения ее стойкости. Показано, что при сохранении требований по быстродействию вычисления дайджеста сообщения на основе модифицированного алгоритма, вероятность коллизии второго рода существенно снижается.This article proposes a modification of the well-known hash ...
openaire +3 more sources

