Results 11 to 20 of about 17,540 (171)

A partial image encryption scheme based on DWT and texture segmentation

open access: yesCogent Engineering, 2022
nowadays, image encryption is an interesting research area due to the rapid growth of communication technologies and the increasing demands for safeguarding the privacy of the transmitted images as unencrypted images are vulnerable to interception ...
Zainab Noori Ghanim   +1 more
doaj   +1 more source

A Modification on Key Stream Generator for RC4 Algorithm [PDF]

open access: yesEngineering and Technology Journal, 2020
Rivest Cipher 4 (RC4) is one of most common stream cipher, but it experience many problem, such as, there is little combination between the plaintext and cipher-text. For this reason RC4 Cipher is vulnerable to a number of attacks.
Suhad Kareem, Abdul Monem Rahma
doaj   +1 more source

Sistem Keamanan Basis Data Klien P.T. Infokes Menggunakan Kriptografi Kombinasi RC4 Dan Base64

open access: yesJurnal Teknologi dan Sistem Informasi, 2020
PT Infokes Indonesia merupakan sebuah perusahaan yang bergerak dalam pembangunan perangkat lunak yang berfokus pada layanan kesehatan. Saat ini pada PT Infokes transaksi basis data dengan klien dilakukan secara konvensional yaitu dengan mengirimkan basis
Irawan Afrianto, Nurhikmah Taliasih
doaj   +1 more source

Roll with the punches: Fibroblast growth factor 10 alleviates pyroptosis of alveolar epithelial cells in different immune niches. [PDF]

open access: yesClin Transl Med
Our study reveals a marked decrease of serum FGF10 levels in ARDS patients, correlating with P/F ratio, hospitalisation days and mortality rates. We clarify how FGF10 prevents AECs' pyroptosis triggered by different immune cell infiltrations in different ways.
Wei T   +10 more
europepmc   +2 more sources

Modelo de acompañamiento pedagógico RC4 en el fortalecimiento del desempeño docente.

open access: yesEncuentros, 2023
El modelo de acompañamiento pedagógico RC4 es un proceso que permite contar con estrategias didácticas y metodológicas innovadoras para fortalecer el desempeño de los docentes.
Ana Isabel Tomalá Andrade   +3 more
doaj   +1 more source

Implementasi Algoritma RC4 pada Sistem Pengamanan Dokumen Digital Soal Ujian

open access: yesJISKA (Jurnal Informatika Sunan Kalijaga), 2021
The development of science and technology has led to changes in the use of documents in life to become digital data. However, this can cause problems, namely regarding data security and confidentiality.
Fauziyah Suwarsita Febriyani   +1 more
doaj   +1 more source

Improvement of nuclear facilities DNP3 protocol data transmission security using super encryption BRC4 in SCADA systems [PDF]

open access: yesPeerJ Computer Science, 2021
Background Data transmissions using the DNP3 protocol over the internet in SCADA systems are vulnerable to interruption, interception, fabrication, and modification through man-in-the-middle (MITM) attacks.
Eko Hadiyono Riyadi   +2 more
doaj   +2 more sources

ANALISA KOMPUTASI ALGORITMA DES DENGAN RC4 UNTUK KEAMANAN DATA

open access: yesJurnal Teknoif Teknik Informatika Institut Teknologi Padang, 2021
Keamanan dan kerahasiaan data merupakan salah satu aspek terpenting dalam bidang komunikasi khususnya komunikasi yang menggunakan media komputer. Salah satu bidang ilmu pengetahuan yang digunakan untuk mengamankan data adalah kriptografi, kecepatan ...
Busran, Jeri Widodo Putra
doaj   +1 more source

Tabu Search Against Permutation Based Stream Ciphers [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2018
Encryption is one of the most effective methods of securing data confidentiality, whether stored on hard drives or transferred (e.g. by e-mail or phone call). In this paper a new state recovery attack with tabu search is introduced. Based on research and
Iwona Polak, Marcin Boryczka
doaj   +1 more source

MV3: A new word based stream cipher using rapid mixing and revolving buffers [PDF]

open access: yes, 2006
MV3 is a new word based stream cipher for encrypting long streams of data. A direct adaptation of a byte based cipher such as RC4 into a 32- or 64-bit word version will obviously need vast amounts of memory. This scaling issue necessitates a look for new
A. Biryukov   +14 more
core   +3 more sources

Home - About - Disclaimer - Privacy