Results 31 to 40 of about 39,218 (293)
Secure File Storage On Cloud Using Hybrid Cryptography
As technology today is moving forward exponentially, data exchange over the Internet has become a daily routine. Furthermore, businesses are growing internationally and offices are being established in a variety of different places throughout the world ...
Jian-Foo Lai, Swee-Huay Heng
doaj +1 more source
Public key algorithms are heavily used in many digital applications including key establishment schemes, secure messaging apps, and digital signature schemes in cryptocurrencies.
Basel Halak +2 more
doaj +1 more source
Dynamic coefficient symmetric polynomial-based secure key management scheme for Internet of Things (IoT) networks [PDF]
Background With the extensive application and continuous expansion of the Internet of Things (IoT), the access of a large number of resource-limited nodes makes the IoT application face a variety of security vulnerabilities and efficiency limitations ...
Zhongya Liu, Yunxiao Luo
doaj +2 more sources
Optimized Implementation and Analysis of CHAM in Quantum Computing
A quantum computer capable of running the Grover search algorithm, which reduces the complexity of brute-force attacks by a square root, has the potential to undermine the security strength of symmetric-key cryptography and hash functions.
Yujin Yang +3 more
doaj +1 more source
E-commerce security has recently been an emerging topic due to the escalation in credit card fraud and stolen user accounts. In general, the security bridge and privacy leakage occur on the side of e-commerce companies due to various factors such as ...
Sena Efsun Cebeci +2 more
doaj +1 more source
The problem of data security is essential because data must be maintained securely and in its integrity, starting with the sending procedure and ending with the intended recipient.
Julia Kurniasih, Dian Tiara Rezalti
doaj +1 more source
Quantum key distribution rates from non-symmetric conic optimization [PDF]
Computing key rates in quantum key distribution (QKD) numerically is essential to unlock more powerful protocols, that use more sophisticated measurement bases or quantum systems of higher dimension.
Andrés González Lorente +3 more
doaj +1 more source
A new DNA strand-based encryption algorithm using symmetric key generation table [PDF]
Qabeela Q. Thabit +2 more
+5 more sources
A computational enhancement of Base64 algorithm using Residue Number System algorithms [PDF]
Today's daily existence depends heavily on the advancement of data, information and communication technologies. Consequently, there is a huge increase in the need for data and information.
Kolawole Bariu LOGUNLEKO +4 more
doaj +1 more source
A Trusted Security Key Management Server in LoRaWAN: Modelling and Analysis
The traditional Long-Range Wide-Area Network (LoRaWAN) uses an Advanced Encryption Standard (AES) 128 bit symmetric key to secure entities and data against several attacks. However, due to the existence of heterogeneous applications, designing a globally
Koketso Ntshabele +3 more
doaj +1 more source

