Results 1 to 10 of about 6,326,042 (362)
Abstract: This study has been undertaken to develop a system where we can securely and efficiently share files. To maintain security between users, an authentication and authorization method is used. Users can upload files to the database. that file will be stored in the database. Generation of OTP will be done by Triple DES. The user will download the
Ashwini Shahaji, Dr. A. Rengarajan
openaire +2 more sources
Whenever new algorithms are designed intruders try to break the key with the help of attack models. No algorithm is perfect against all attacks. But DES irrespective of its small key size, it has been considered to be strong design cipher till today ...
Mounika Jammula
openalex +2 more sources
Electronic Health Record (EHR) is an electronic version of a patient's medical history maintained by a health care service from time to time. The hacking of medical record data by irresponsible parties is a security threat to the EHR system, including ...
Muhammad Yunus +4 more
openalex +3 more sources
Perancangan Enkripsi Pada Citra Bitmap Dengan Algoritma Des, Triple Des, dan Idea
Rapid development of Information Technology causes information can access easier without space boundaries. Image is a form of information, which contains many information.
Agustinna Yosanny
doaj +3 more sources
Le texte interroge le sort des prisonniers de guerre dans la guerre de la Triple Alliance (1865-1870). Les élites belligérantes furent dans leur ensemble conscientes de l'importance à respecter les principes et coutumes du "droit de guerre", à une époque
Luc Capdevila
doaj +2 more sources
Data Encryption and Decryption by Using Triple DES and Performance Analysis of Crypto System [PDF]
: This paper contains a technique for secret communication using cryptography. It is a technique which is used to protect the important data. The secret message is encrypted by a block cipher based on two cryptographic algorithms, the Data Encryption ...
S. L. Karthik, A. Muruganandam
openalex +2 more sources
In this paper, various types of quantum circuits for DES components are proposed to analyze the trade-offs in quantum resources for both DES and TDES block ciphers.
Gyeongju Song +2 more
doaj +2 more sources
Le triple don et/ou la triple aliénation des femmes
L’article esquisse un type idéal anthropologique de la condition féminine telle qu’elle a été organisée historiquement autour du don de la vie fait par les femmes mais très souvent dénié comme tel. Condition qui s’organise à partir d’un triple don des femmes qui peut aussi être vu comme une triple aliénation. Vouées à être données et à se donner, elles
Alain Caillé
openalex +3 more sources
Performance Analysis of DES and Triple DES
the fast progression of digital data exchange in electronic way, information security is becoming much more important in data storage and transmission. Cryptography has come up as a solution which plays a vital role in information security system against malicious attacks.
Dr.O.Srinivasa Rao
openaire +2 more sources
Triple-DES block of 96 Bits: An application to colour image encryption
Víctor Manuel Silva-García +2 more
openalex +2 more sources

