Results 11 to 20 of about 379,633 (259)

Improving LZW Compression of Unicode Arabic Text Using Multi-Level Encoding and a Variable-Length Phrase Code

open access: yesIEEE Access, 2023
This paper introduces a novel approach to enhance the efficiency of compressing Arabic Unicode text using the Lempel-Ziv-Welch (LZW) technique. This method includes two stages: transformation and compression.
Enas Abu Jrai   +4 more
doaj   +1 more source

Service for Verification of Electronic Document’s Certificates

open access: yesЦифровая трансформация, 2023
The legislation of the Republic of Belarus currently establishes the same legal force for identical documents on paper and in electronic form, which have a mandatory requisite - an electronic digital signature.
I. O. Tolokh   +2 more
doaj   +1 more source

A Secure Mobile Banking Using Kerberos Protocol [PDF]

open access: yesEngineering and Technology Journal, 2009
Because the network is an open environment, a lot of care must be taken whentransferring sensitive information especially when related with financial data.
Mohammad N. Abdullah, May T. Abdul-Hadi
doaj   +1 more source

Matrično zasnovan algoritam za skrivanje tekstova i obradu informacija

open access: yesVojnotehnički Glasnik, 2014
Primena diferencijalne geometrije u skrivanju tekstualnih podataka prikazana je u ovom radu. Ta primena predstavlja generalizaciju prethodno predstavljenih metoda. Matrično vrednosne funkcije više promenljivih korišćene su u ovom radu.
Nenad O. Vesić, Dušan J. Simjanović
doaj   +1 more source

Enriching Information Security via Hybrid of New Expand Rivest Shamir Adleman and Data Encryption Standard Cryptosystem

open access: yesJournal of Applied Sciences and Environmental Management, 2023
Cryptography system gives security services ability to protect information from people who are authorized to use it. This research introduces elevated information security system via hybrid of new expand Rivest Shamir Adleman (RSA) and data encryption ...
M. B. Hammawa   +2 more
doaj   +1 more source

A hybrid cryptosystem for cloud security: combining Okamoto-Uchiyama and Advanced Encryption Standard for optimized encryption performance [PDF]

open access: yesمجلة جامعة الانبار للعلوم الصرفة
The central challenge in cloud computing is delivering strong data protection while maintaining high system performance. This paper addresses the problem by developing a hybrid cryptosystem that integrates the strengths of Okamoto-Uchiyama (OU) and ...
Azhar Malik
doaj   +1 more source

Reminisce: Blockchain Private Key Generation and Recovery Using Distinctive Pictures-Based Personal Memory

open access: yesMathematics, 2022
As a future game-changer in various industries, cryptocurrency is attracting people’s attention. Cryptocurrency is issued on blockchain and managed through a blockchain wallet application.
Jungwon Seo   +4 more
doaj   +1 more source

Function-Private Functional Encryption in the Private-Key Setting [PDF]

open access: yesJournal of Cryptology, 2015
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Brakerski, Zvika, Segev, Gil
openaire   +1 more source

A Private Key Management Scheme on Blockchain Against Collusion Attacks [PDF]

open access: yesJisuanji gongcheng, 2020
To address the security of the recovery of lost private keys on the blockchain,this paper proposes a distributed management scheme for private keys based on threshold secret sharing.The scheme combines the user’s private key with the secret password as a
ZHOU Jian, QU Ran
doaj   +1 more source

Improving the security of LSB image steganography

open access: yesJOIV: International Journal on Informatics Visualization, 2019
Steganography is the technique of hiding secret data (message) within any media such as digital color image. In this paper we will merge steganography process with cryptography process in order to increase the security of the proposed method.
Jamil Al-Azzeh   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy