Results 21 to 30 of about 3,565 (253)
Program for Simulation and Testing of Apply Cryptography of Advance Encryption Standard (AES) Algorithm with Rivest-Shamir-Adleman (RSA) Algorithm for Good Performance [PDF]
Nowadays, information security management systems are important parts of managing a system for better handling of the information security. In scenarios and situations where safety management is done by managing protection of malwares, it is important to
Santi Pattanavichai
doaj +1 more source
Identity-based key-insulated aggregate signature scheme
Private key exposure can be the most devastating attack on cryptographic schemes; as such exposure leads to the breakage of security of the scheme as a whole. In the real world scenario, this problem is perhaps the biggest threat to cryptography.
P. Vasudeva Reddy, P.V.S.S.N. Gopal
doaj +1 more source
IMPLEMENTATION OF BLOM’S KEY PREDISTRIBUTION SCHEME BY USING ELLIPTIC CURVE CRYPTOGRAPHY
Cryptography, along with its various methods is used to serve the security communication purpose. Cryptography is said to be secure if the encryption key is hard to break by the attacker.
Md Nizam Udin +5 more
doaj +1 more source
A Practical Analysis of the Fermat Factorization and Pollard Rho Method for Factoring Integers
The development of public-key cryptography generation using the factoring method is very important in practical cryptography applications. In cryptographic applications, the urgency of factoring is very risky because factoring can crack public and ...
Aminudin Aminudin, Eko Budi Cahyono
doaj +1 more source
Secure E-Mail System Using S/Mime and Ib-Pkc [PDF]
Although e-mail security solutions have been introduced formore than two decades, most of the e-mail messages are sent nowadayswithout being secured by any of these techniques.
Sufyan Faraj, Mohammed Ibrahem
doaj +1 more source
SECURE E-MAIL SYSTEM USING S/MIME AND IB-PKC [PDF]
Although e-mail security solutions have been introduced for more than two decades, most of the e-mail messages are sent nowadays without being secured by any of these techniques.
MOHAMMED T. IBRAHEM, SUFYAN T. FARAJ
doaj +1 more source
ABSTRACT Background The HIT network was established in 2000 to create a population‐based structure aiming to improve survival rates and reduce late effects for children with central nervous system (CNS) tumors by conducting comprehensive clinical trials.
Stefan Rutkowski +59 more
wiley +1 more source
Elliptic curve cryptography includes symmetric key cryptography systems that base their security on mathematical problems of elliptic curves. There are several ways that can be used to define the elliptic curve equation that depends on the infinite field
Juhari Juhari, Mohamad Febry Andrean
doaj +1 more source
KLK7, a tissue kallikrein‐related peptidase, is elevated in advanced colorectal cancer and associated with shorter survival. High KLK7 levels in ascites correlate with peritoneal metastasis. In mice, KLK7 overexpression increases metastasis. In vitro, KLK7 enhances cancer cell proliferation, migration, adhesion, and spheroid formation, driving ...
Yosr Z. Haffani +6 more
wiley +1 more source
EthVault: A Secure and Resource‐Conscious FPGA‐Based Ethereum Cold Wallet
Cryptocurrency blockchain networks safeguard digital assets using cryptographic keys, with wallets playing a critical role in generating, storing, and managing these keys.
Joel Poncha Lemayian +3 more
doaj +1 more source

