Results 101 to 110 of about 167,764 (227)

Learning tool for IPSEC with emphasis on the use of MGRE in corporate networks

open access: yesRevista UIS Ingenierías, 2013
This paper presents a tool named “UV IPsec Tools”, developed to understand and interact in a didactic way with the transformations performed by IPsec when using the MD5, SHA-1 and 3DES algorithms for the encryption and integrity check of an IPv4 datagram.
Andrés Mauricio Ramírez   +2 more
doaj  

О модификации алгоритма MD5

open access: yesНаучные ведомости Белгородского государственного университета. Серия: Экономика. Информатика, 2016
В данной статье предлагается вариант модификации известной хэш-функции с целью повышения ее стойкости. Показано, что при сохранении требований по быстродействию вычисления дайджеста сообщения на основе модифицированного алгоритма, вероятность коллизии второго рода существенно снижается.This article proposes a modification of the well-known hash ...
openaire   +3 more sources

Data Storage Security in Cloud Computing Using AES Algorithm and MD5 Algorithm

open access: diamond, 2022
Vaibhav Varma   +4 more
openalex   +1 more source

An Analisys of Business VPN Case Studies [PDF]

open access: yes
A VPN (Virtual Private Network) simulates a secure private network through a shared public insecure infrastructure like the Internet. The VPN protocol provides a secure and reliable access from home/office on any networking technology transporting IP ...
Crescenzio Gallo   +2 more
core  

RANCANG BANGUN APLIKASI PENGAMANAN AKTA NOTARIS MENGGUNAKAN MD5 PADA KANTOR NOTARIS TAUFIQURRACHMAN, S.H.

open access: diamond, 2022
Inayatullah Inayatullah   +3 more
openalex   +2 more sources

Aspects of a Watermark Solution [PDF]

open access: yes
Although watermarking is a relatively new technology, there are many ways of applying it on an electronic data set with the purpose of ensuring copyright integrity and authenticity of the electronic data. But, bearing in mind the evolution of information
Crina RATIU   +2 more
core  

Research on the multi-message modification techniques on MD5

open access: yesTongxin xuebao, 2009
According to research on the message modification techniques presented by Wang Xiaoyun et al and the advanced message modification techniques proposed by Yu Sasaki et al, the multi-message modification techniques were founded to not be always able to ...
CHEN Shi-wei, JIN Chen-hui
doaj   +2 more sources

Funciones resúmenes o hash

open access: yesTelemática, 2012
El presente artículo aborda de manera general algunas de las funciones resúmenes (hash) más empleadas en criptografía tales como MD5, SHA-1, RIPEMD y HAVAL, así como los algoritmos básicos de funcionamiento de cada una de ellas, su aplicación o uso y sus
Lic. Sandra Blain Escalona   +1 more
doaj  

Home - About - Disclaimer - Privacy