Results 11 to 20 of about 5,884,412 (84)
Electronic Health Record (EHR) is an electronic version of a patient's medical history maintained by a health care service from time to time. The hacking of medical record data by irresponsible parties is a security threat to the EHR system, including ...
Muhammad Yunus +4 more
semanticscholar +1 more source
Hybrid Cryptosystem Analysis RSA Algorithm And Triple DES Algorithm
Data security is needed in terms of communication. To guarantee data security, a technique is needed to make data and information called Critography. This study aims to analyze the process of Super Encryption in symmetric and asymmetric criterias using ...
Liana Liana, M. Zarlis, Tulus Tulus
semanticscholar +1 more source
Perancangan Aplikasi Enkripsi & Deskripsi pada Dokumen Dengan Algoritma Triple DES Berbasis Web
Keamanan sangat perlu digunakan, karena data bersifat rahasia dan tidak bisa digunakan oleh pihak manapun kecuali pihak yang bersangkutan. Untuk itu, pengguna membutuhkan keamanan data dengan menggunakan kriptografi.
Muklas Adik Putra +3 more
semanticscholar +1 more source
Whenever new algorithms are designed intruders try to break the key with the help of attack models. No algorithm is perfect against all attacks. But DES irrespective of its small key size, it has been considered to be strong design cipher till today ...
Mounika Jammula
semanticscholar +1 more source
: This study has been undertaken to develop a system where we can securely and efficiently share files. To maintain security between users, an authentication and authorization method is used. Users can upload files to the database.
Ashwini Shahaji, Dr.A. Rengarajan
semanticscholar +1 more source
A Compact Cryptosystem Design of Triple-DES
Symmetric encryption algorithms are widely used in the field of information security due to the rapid increasing need to pass information via computer networks and communication technology.
Murtada Mohamed Abdelwahab
semanticscholar +1 more source
Des écrivains jumeaux : mise en abyme de l’auteur réel, en symbiose avec le personnage
Étude approfondie des deux seuls films sur des écrivains jumeaux que j’aie pu identifier, en vingt vingt ans de recherches sur la figure de l’écrivain. Comment et pourquoi cette configuration?
Trudy Bolter
doaj +1 more source
Intelligent TRIPLE DES with N Round Based on Genetic Algorithm
This work presents an approach for the applying Triple DES (TRIPLE DES) based on using genetic algorithm by adding intelligent feature for TRIPLE DES with N round for genetic algorithm.
M. Haithem, R. Lateef
semanticscholar +1 more source
Réécriture par Leopardi du topos mythologique et littéraire du démon méridien
L’article se propose d’illustrer les scènes méridiennes des Canti sur la base des annotations relatives aux anciennes croyances concernant l’instant de midi contenues dans le Saggio sopra gli errori popolari degli antichi.
Andrea Natali
doaj +1 more source
A hybrid cryptosystem approach for data security by using triple DES algorithm and ElGamal algorithm
The Internet is the communication path used in data exchange. Nevertheless, the delivery process is often experienced disturbance caused by outsiders who are not interested.
D. Rachmawati, A. S. Harahap, R N Purba
semanticscholar +1 more source

