Results 71 to 80 of about 17,540 (171)
A Robust Approach for Mixed Technique of Data Encryption Between DES and RC4 Algorithm
In this research, the well-known encryption algorithms in the encryption Systems, namely DES & RC4 and the advantages and disadvantages of each algorithm are reviewed and evaluated.
Tameem Hameed Obaida, Dhafar Hamed Abd
doaj +1 more source
Improvement of the Minimal‐Guess‐Basis MILP Model and Its Application to ESF
The guess‐and‐determine technique find wide applications in the recovery of unknown variables within given system of relations. The fundamental concept behind this technique involves guessing certain unknown variables and deducing the remaining ones based on the relational system.
Lingchen Li +5 more
wiley +1 more source
LIMA: Local and Lightweight Mutual Authentication for VANETs
This work presents LIMA, a lightweight local authentication protocol for VANETs. It is a SAE J2735 compliant certificateless vehicle authentication that eliminates traditional PKI dependencies while providing geographic zone‐based security and time‐based attribute control.
Munkenyi Mukhandi +2 more
wiley +1 more source
Lock-Free and Practical Deques using Single-Word Compare-And-Swap
We present an efficient and practical lock-free implementation of a concurrent deque that is disjoint-parallel accessible and uses atomic primitives which are available in modern computer systems.
A. Silberschatz +4 more
core +1 more source
Bounds for DNA codes with constant GC-content
We derive theoretical upper and lower bounds on the maximum size of DNA codes of length n with constant GC-content w and minimum Hamming distance d, both with and without the additional constraint that the minimum Hamming distance between any codeword ...
King, Oliver D.
core +3 more sources
The Propensity of European Grayling to Migrate Is Determined by Individual Characteristics
ABSTRACT Migrations are characterised as adaptive mechanisms aimed at improving the fitness of an individual. Hence, the propensity to migrate can be analysed by considering body size and movement activity when individuals search for available resources.
Ondřej Slavík +4 more
wiley +1 more source
Implementasi Algoritma Kriptografi RC4 pada Sistem Keamanan Jaringan Telepon [PDF]
Tujuan dari penelitian ini adalah untuk menghasilkan sebuah produk pengacak sinyal suara yang bisa menjamin keamanan pengiriman informasi melalui jaringan telepon.
Yuliana, Mike
core
Enhance the Hiding Image by Using Compression and Securing Techniques
Information security is a huge trending topic in recent year. Many technique and algorithm were designed and developed to achieve the security of information and/or network across the world.
Ahmed S. Farhan +2 more
doaj +1 more source
First Report of Damping‐off Caused by Phytopythium helicoides on Cabbage
New Disease Reports, Volume 53, Issue 1, January/March 2026.
Misa Matsumura, Motoaki Tojo
wiley +1 more source
Peningkatan Keamanan Basis Data menggunakan Kombinasi Algoritma RC4 dan SHA3-512
Abstrak Perkembangan teknologi yang pesat membuat banyak sistem menjadi terdigitalisasi dan terintegrasi. Banyak sistem yang memuat data-data yang penting seperti profil pengguna, no handphone, e-mail, nomor kependudukan, bahkan hingga file-file dokumen
Asep Rizal Nurjaman, Sofia Umaroh
doaj +1 more source

