Results 81 to 90 of about 17,540 (171)

Year 2010 Issues on Cryptographic Algorithms [PDF]

open access: yes
In the financial sector, cryptographic algorithms are used as fundamental techniques for assuring confidentiality and integrity of data used in financial transactions and for authenticating entities involved in the transactions.
Masashi Une, Masayuki Kanda
core  

Quantum Key Based Burst Confidentiality in Optical Burst Switched Networks

open access: yesThe Scientific World Journal, 2014
The optical burst switching (OBS) is an emergent result to the technology concern that could achieve a feasible network in future. They are endowed with the ability to meet the bandwidth requirement of those applications that require intensive bandwidth.
A. M. Balamurugan, A. Sivasubramanian
doaj   +1 more source

SIMULASI KUNCI ELEKTRONIK DENGAN ENKRIPSI MELALUI BLUETOOTH PADA PONSEL

open access: yesCommIT Journal, 2008
Currently the facility provided by mobile phones is very diverse. Starting from the phone, SMS, camera, music player, all rolled into one. Obviously the phone can also be used as electronic keys to replace the existing analog key at this time.
Indri Neforawati, Hoga Saragih
doaj   +1 more source

Debilidad SAC en el algoritmo de cifrado en flujo RC4

open access: yesReCIBE, 2017
En este trabajo se describe una interesante vía para la detección de la existencia de entradas de colisión en el algoritmo de cifrado en flujo RC4 basado en el criterio estricto de avalancha y se discuten los resultados obtenidos en comparación con las ...
Evaristo J. Madarro Capó   +3 more
doaj  

ANALISIS ALGORITMA KRIPTOGRAFI RC4 PADA ENKRIPSI CITRA DIGITAL

open access: yesTechno.Com, 2015
Keamanan dan kerahasian merupakan aspek penting dari suatu pesan, data maupun informasi baik berupa data teks, gambar maupun video. Salah satu cara untuk melindungi data citra digital tersebut dengan cara dekripsi dan enkripsi.
Galuh Adjeng Sekarsari   +2 more
doaj  

Data Compression and Encryption Fusion: A Review of Hybrid Techniques for Secure and Efficient Online Transmission

open access: yesIEEE Access
With the exponential growth of digital data, ensuring efficient and secure online file transmission has become a significant challenge. This study presents a comprehensive analysis of hybrid compression-encryption techniques, evaluating their impact on ...
Lei Zhao   +4 more
doaj   +1 more source

Asian dust outflow in the PBL and free atmosphere retrieved by NASA CALIPSO and an assimilated dust transport model [PDF]

open access: yesAtmospheric Chemistry and Physics, 2009
Three-dimensional structures of Asian dust transport in the planetary boundary layer (PBL) and free atmosphere occurring successively during the end of May 2007 were clarified using results of space-borne backscatter lidar, Cloud-Aerosol Lidar with ...
Y. Hara   +6 more
doaj  

ALGORITMA RC4 DALAM PROTEKSI TRANSMISI DAN HASIL QUERY UNTUK ORDBMS POSTGRESQL

open access: yesJurnal Informatika, 2009
In this research will be worked through about how cryptography RC4's algorithm implementation in protection to query result and of query, security by encryption and descryption up to both is in network.
Yuri Ariyanto
doaj  

Abstracts

open access: yes
Cancer Science, Volume 117, Issue S1, Page 1-2148, January 2026.
wiley   +1 more source

Home - About - Disclaimer - Privacy