Results 11 to 20 of about 379,633 (259)
This paper introduces a novel approach to enhance the efficiency of compressing Arabic Unicode text using the Lempel-Ziv-Welch (LZW) technique. This method includes two stages: transformation and compression.
Enas Abu Jrai +4 more
doaj +1 more source
Service for Verification of Electronic Document’s Certificates
The legislation of the Republic of Belarus currently establishes the same legal force for identical documents on paper and in electronic form, which have a mandatory requisite - an electronic digital signature.
I. O. Tolokh +2 more
doaj +1 more source
A Secure Mobile Banking Using Kerberos Protocol [PDF]
Because the network is an open environment, a lot of care must be taken whentransferring sensitive information especially when related with financial data.
Mohammad N. Abdullah, May T. Abdul-Hadi
doaj +1 more source
Matrično zasnovan algoritam za skrivanje tekstova i obradu informacija
Primena diferencijalne geometrije u skrivanju tekstualnih podataka prikazana je u ovom radu. Ta primena predstavlja generalizaciju prethodno predstavljenih metoda. Matrično vrednosne funkcije više promenljivih korišćene su u ovom radu.
Nenad O. Vesić, Dušan J. Simjanović
doaj +1 more source
Cryptography system gives security services ability to protect information from people who are authorized to use it. This research introduces elevated information security system via hybrid of new expand Rivest Shamir Adleman (RSA) and data encryption ...
M. B. Hammawa +2 more
doaj +1 more source
A hybrid cryptosystem for cloud security: combining Okamoto-Uchiyama and Advanced Encryption Standard for optimized encryption performance [PDF]
The central challenge in cloud computing is delivering strong data protection while maintaining high system performance. This paper addresses the problem by developing a hybrid cryptosystem that integrates the strengths of Okamoto-Uchiyama (OU) and ...
Azhar Malik
doaj +1 more source
As a future game-changer in various industries, cryptocurrency is attracting people’s attention. Cryptocurrency is issued on blockchain and managed through a blockchain wallet application.
Jungwon Seo +4 more
doaj +1 more source
Function-Private Functional Encryption in the Private-Key Setting [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Brakerski, Zvika, Segev, Gil
openaire +1 more source
A Private Key Management Scheme on Blockchain Against Collusion Attacks [PDF]
To address the security of the recovery of lost private keys on the blockchain,this paper proposes a distributed management scheme for private keys based on threshold secret sharing.The scheme combines the user’s private key with the secret password as a
ZHOU Jian, QU Ran
doaj +1 more source
Improving the security of LSB image steganography
Steganography is the technique of hiding secret data (message) within any media such as digital color image. In this paper we will merge steganography process with cryptography process in order to increase the security of the proposed method.
Jamil Al-Azzeh +3 more
doaj +1 more source

