Results 81 to 90 of about 219,404 (221)

Symmetric Key Cryptography: Technological Developments in the Field

open access: yes, 2015
This paper presents the various developments and emerging trends in the symmetric key cryptography technique. It provides an overview of latest inventions and approaches that are implemented in the recent scenario for the betterment of private key ...
Md. Sarfaraz Iqbal   +2 more
semanticscholar   +1 more source

Analytical Study of Hybrid Techniques for Image Encryption and Decryption

open access: yesSensors, 2020
The majority of imaging techniques use symmetric and asymmetric cryptography algorithms to encrypt digital media. Most of the research works contributed in the literature focus primarily on the Advanced Encryption Standard (AES) algorithm for encryption ...
Chiranji Lal Chowdhary   +5 more
doaj   +1 more source

Quantum random number generators and their use in cryptography

open access: yes, 2011
Random number generators (RNG) are an important resource in many areas: cryptography (both quantum and classical), probabilistic computation (Monte Carlo methods), numerical simulations, industrial testing and labeling, hazard games, scientific research,
Stipcevic, Mario
core   +1 more source

Enkripsi dan Dekripsi File dengan Algoritma Blowfish pada Perangkat Mobile Berbasis Android

open access: yesJurnal Nasional Teknik Elektro, 2016
Cryptography is one of the ways used to secure data in the form of a file with encrypt files so that others are not entitled to know the file is private and confidential.
Siswo Wardoyo   +2 more
doaj   +1 more source

Information and data protection within a RDBMS

open access: yesCondensed Matter Physics, 2008
Security issues for some special large data, such as binary and image files, as well as video and audio files and streams still require a special development, especially for the industrial database systems (Oracle, MS SQL, DB2, etc).
Y. Khmelevsky
doaj   +1 more source

IMPLEMENTASI KOMPILASI ALGORITMA KRIPTOGRAFI TRANSPOSISI COLUMNAR DAN RSA UNTUK PENGAMANAN PESAN RAHASIA

open access: yesJurnal informatika UPGRIS, 2019
Data security is important in maintaining the confidentiality of certain data that can only be known by those who have rights. If the data transmission is done by using network, there is a big possibility the data to be known by unauthorized parties ...
Yuza Reswan   +2 more
doaj   +1 more source

A Context-Based Secure Handover Mechanism for Space-Ground-Integrated Network

open access: yesResearch Briefs on Information & Communication Technology Evolution, 2020
This paper suggests a context-based secure handover mechanism for the frequent handover problem of satellite access nodes due to its high-speed motion in Space-Ground-Integrated Network. This approach applies Private Key Generator (PKG) in identity-based
Hang Zhao
doaj   +1 more source

Privacy and Nomadic Computing: A Public-Key Cryptosystem Based on Passwords

open access: yes, 2012
5 pages - ISSN 2105-0422The use of public-key cryptography is complicated in a nomadic computing era. Private keys are typically huge numbers that are impossible to memorize or even to write down and have to be stored electronically.
Prost, Frederic, Terras, Lydie
core   +2 more sources

A chaotic based image encryption scheme using elliptic curve cryptography and genetic algorithm

open access: yesArtificial Intelligence Review
In the era of digital communication and data security, image encryption plays a crucial role in safeguarding sensitive information. Protecting sensitive visual data from unauthorized access drives the pursuit of advanced image encryption methods.
Sanjay Kumar, Deepmala Sharma
semanticscholar   +1 more source

Cryptography: Mathematical Advancements on Cyber Security [PDF]

open access: yes, 2019
The origin of cryptography, the study of encoding and decoding messages, dates back to ancient times around 1900 BC. The ancient Egyptians enlisted the use of basic encryption techniques to conceal personal information.
Bower, Kristin
core   +1 more source

Home - About - Disclaimer - Privacy