Results 81 to 90 of about 17,540 (171)
Year 2010 Issues on Cryptographic Algorithms [PDF]
In the financial sector, cryptographic algorithms are used as fundamental techniques for assuring confidentiality and integrity of data used in financial transactions and for authenticating entities involved in the transactions.
Masashi Une, Masayuki Kanda
core
Quantum Key Based Burst Confidentiality in Optical Burst Switched Networks
The optical burst switching (OBS) is an emergent result to the technology concern that could achieve a feasible network in future. They are endowed with the ability to meet the bandwidth requirement of those applications that require intensive bandwidth.
A. M. Balamurugan, A. Sivasubramanian
doaj +1 more source
SIMULASI KUNCI ELEKTRONIK DENGAN ENKRIPSI MELALUI BLUETOOTH PADA PONSEL
Currently the facility provided by mobile phones is very diverse. Starting from the phone, SMS, camera, music player, all rolled into one. Obviously the phone can also be used as electronic keys to replace the existing analog key at this time.
Indri Neforawati, Hoga Saragih
doaj +1 more source
Debilidad SAC en el algoritmo de cifrado en flujo RC4
En este trabajo se describe una interesante vía para la detección de la existencia de entradas de colisión en el algoritmo de cifrado en flujo RC4 basado en el criterio estricto de avalancha y se discuten los resultados obtenidos en comparación con las ...
Evaristo J. Madarro Capó +3 more
doaj
ANALISIS ALGORITMA KRIPTOGRAFI RC4 PADA ENKRIPSI CITRA DIGITAL
Keamanan dan kerahasian merupakan aspek penting dari suatu pesan, data maupun informasi baik berupa data teks, gambar maupun video. Salah satu cara untuk melindungi data citra digital tersebut dengan cara dekripsi dan enkripsi.
Galuh Adjeng Sekarsari +2 more
doaj
With the exponential growth of digital data, ensuring efficient and secure online file transmission has become a significant challenge. This study presents a comprehensive analysis of hybrid compression-encryption techniques, evaluating their impact on ...
Lei Zhao +4 more
doaj +1 more source
Asian dust outflow in the PBL and free atmosphere retrieved by NASA CALIPSO and an assimilated dust transport model [PDF]
Three-dimensional structures of Asian dust transport in the planetary boundary layer (PBL) and free atmosphere occurring successively during the end of May 2007 were clarified using results of space-borne backscatter lidar, Cloud-Aerosol Lidar with ...
Y. Hara +6 more
doaj
ALGORITMA RC4 DALAM PROTEKSI TRANSMISI DAN HASIL QUERY UNTUK ORDBMS POSTGRESQL
In this research will be worked through about how cryptography RC4's algorithm implementation in protection to query result and of query, security by encryption and descryption up to both is in network.
Yuri Ariyanto
doaj
Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond [PDF]
Dawson, Edward, Henricksen, Matthew
core +2 more sources

