Results 61 to 70 of about 60,860 (288)
Integrated semi‐quantum layered communication
In recent times, secure quantum communication in layered networks has emerged as an important area of study. The authors harness the potential offered by multidimensional states in secure quantum communication with only one quantum participant and all ...
Rajni Bala +2 more
doaj +1 more source
Fraction-Integer Mehod (FIM) for Calculating Multiplicative Inverse [PDF]
Multiplicative inverse is a crucial operation in public key cryptography. Public key cryptography has given rise to such a need, in which we need to generate a related public/private pair of numbers, each of which is the inverse of the other.
Sattar Aboud
doaj
Securing Additive Manufacturing with Blockchains and Distributed Physically Unclonable Functions
Blockchain technology is a game-changing, enhancing security for the supply chain of smart additive manufacturing. Blockchain enables the tracking and recording of the history of each transaction in a ledger stored in the cloud that cannot be altered ...
Bertrand Cambou +9 more
doaj +1 more source
Analisis Kompleksitas Waktu Algoritma Kriptografi Elgamal dan Data Encryption Standard [PDF]
ElGamal as an asymmetric key cryptography system and Data Encryption Standard (DES) as a symmetric key cryptography system, both of algorithms will be compared using the time complexity analysis and computer simulation.
Kabetta, H. (Herman)
core
Biopolymers are sustainable, biodegradable alternatives to petroleum‐based plastics for food packaging. Its adoption is often limited by poor mechanical strength, barrier properties, and improved thermal stability through the incorporation of nanofillers.
Himakshi Baishya +2 more
wiley +1 more source
Protecting Digital Images Using Keys Enhanced by 2D Chaotic Logistic Maps
This research paper presents a novel digital color image encryption approach that ensures high-level security while remaining simple and efficient. The proposed method utilizes a composite key r and x of 128-bits to create a small in-dimension private ...
Mua’ad Abu-Faraj +6 more
doaj +1 more source
LPKI - A Lightweight Public Key Infrastructure for the Mobile Environments
The non-repudiation as an essential requirement of many applications can be provided by the asymmetric key model. With the evolution of new applications such as mobile commerce, it is essential to provide secure and efficient solutions for the mobile ...
Beheshti, A. A., Toorani, M.
core +3 more sources
The integration of photovoltaic (PV) systems into building structures introduces distinct fire risks with critical implications for occupant safety. This review examines the key fire hazards associated with PV implementation and explores mitigation strategies, including flame‐retardant additives.
Florian Ollagnon +7 more
wiley +1 more source
Pengamanan Data Informasi Menggunakan Kriptografi Klasik [PDF]
Kriptografi (cryptography) merupakan ilmu dan seni untuk menjaga pesan agar aman. (Cryptography is the art and science of keeping messages secure) “Crypto” berarti “secret” (rahasia) dan “graphy” berarti “writing” (tulisan).
Sasongko, J. (Jati)
core
High‐density BNNT films, enabling mechanical robustness and high space radiation shielding effectiveness, are fabricated using surfactant‐stabilized BNNT liquid crystal. Simulations indicate that a 50 g cm−2 BNNT film can reduce radiation exposure by 56% compared to zero shielding, potentially doubling the duration of astronaut missions on the lunar ...
Young‐Kyeong Kim +17 more
wiley +1 more source

