Results 31 to 40 of about 39,218 (293)

Secure File Storage On Cloud Using Hybrid Cryptography

open access: yesJournal of Informatics and Web Engineering, 2022
As technology today is moving forward exponentially, data exchange over the Internet has become a daily routine. Furthermore, businesses are growing internationally and offices are being established in a variety of different places throughout the world ...
Jian-Foo Lai, Swee-Huay Heng
doaj   +1 more source

Comparative Analysis of Energy Costs of Asymmetric vs Symmetric Encryption-Based Security Applications

open access: yesIEEE Access, 2022
Public key algorithms are heavily used in many digital applications including key establishment schemes, secure messaging apps, and digital signature schemes in cryptocurrencies.
Basel Halak   +2 more
doaj   +1 more source

Dynamic coefficient symmetric polynomial-based secure key management scheme for Internet of Things (IoT) networks [PDF]

open access: yesPeerJ Computer Science, 2023
Background With the extensive application and continuous expansion of the Internet of Things (IoT), the access of a large number of resource-limited nodes makes the IoT application face a variety of security vulnerabilities and efficiency limitations ...
Zhongya Liu, Yunxiao Luo
doaj   +2 more sources

Optimized Implementation and Analysis of CHAM in Quantum Computing

open access: yesApplied Sciences, 2023
A quantum computer capable of running the Grover search algorithm, which reduces the complexity of brute-force attacks by a square root, has the potential to undermine the security strength of symmetric-key cryptography and hash functions.
Yujin Yang   +3 more
doaj   +1 more source

Secure E-Commerce Scheme

open access: yesIEEE Access, 2022
E-commerce security has recently been an emerging topic due to the escalation in credit card fraud and stolen user accounts. In general, the security bridge and privacy leakage occur on the side of e-commerce companies due to various factors such as ...
Sena Efsun Cebeci   +2 more
doaj   +1 more source

Text Encryption Analysis of Modified Symmetric Keys using Genetic Algorithm on Caesar Cipher and One Time Pad

open access: yesIJIE (Indonesian Journal of Informatics Education), 2022
The problem of data security is essential because data must be maintained securely and in its integrity, starting with the sending procedure and ending with the intended recipient.
Julia Kurniasih, Dian Tiara Rezalti
doaj   +1 more source

Quantum key distribution rates from non-symmetric conic optimization [PDF]

open access: yesQuantum
Computing key rates in quantum key distribution (QKD) numerically is essential to unlock more powerful protocols, that use more sophisticated measurement bases or quantum systems of higher dimension.
Andrés González Lorente   +3 more
doaj   +1 more source

A computational enhancement of Base64 algorithm using Residue Number System algorithms [PDF]

open access: yesRevista Română de Informatică și Automatică
Today's daily existence depends heavily on the advancement of data, information and communication technologies. Consequently, there is a huge increase in the need for data and information.
Kolawole Bariu LOGUNLEKO   +4 more
doaj   +1 more source

A Trusted Security Key Management Server in LoRaWAN: Modelling and Analysis

open access: yesJournal of Sensor and Actuator Networks, 2022
The traditional Long-Range Wide-Area Network (LoRaWAN) uses an Advanced Encryption Standard (AES) 128 bit symmetric key to secure entities and data against several attacks. However, due to the existence of heterogeneous applications, designing a globally
Koketso Ntshabele   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy