Results 11 to 20 of about 5,884,412 (84)

File Security Design in Electronic Health Record (EHR) System with Triple DES Algorithm (3DES) at Jember Family Health Home Clinic

open access: yesInternational Journal of Health and Information System, 2023
Electronic Health Record (EHR) is an electronic version of a patient's medical history maintained by a health care service from time to time. The hacking of medical record data by irresponsible parties is a security threat to the EHR system, including ...
Muhammad Yunus   +4 more
semanticscholar   +1 more source

Hybrid Cryptosystem Analysis RSA Algorithm And Triple DES Algorithm

open access: yesSinkrOn, 2023
Data security is needed in terms of communication. To guarantee data security, a technique is needed to make data and information called Critography. This study aims to analyze the process of Super Encryption in symmetric and asymmetric criterias using ...
Liana Liana, M. Zarlis, Tulus Tulus
semanticscholar   +1 more source

Perancangan Aplikasi Enkripsi & Deskripsi pada Dokumen Dengan Algoritma Triple DES Berbasis Web

open access: yesJurnal Pendidikan Sains dan Komputer, 2022
Keamanan sangat perlu digunakan, karena data bersifat rahasia dan tidak bisa digunakan oleh pihak manapun kecuali pihak yang bersangkutan. Untuk itu, pengguna membutuhkan keamanan data dengan menggunakan kriptografi.
Muklas Adik Putra   +3 more
semanticscholar   +1 more source

Comparative Study on DES and Triple DES Algorithms and Proposal of a New Algorithm Named Ternary DES for Digital Payments

open access: yesAsian journal of applied science and technology, 2022
Whenever new algorithms are designed intruders try to break the key with the help of attack models. No algorithm is perfect against all attacks. But DES irrespective of its small key size, it has been considered to be strong design cipher till today ...
Mounika Jammula
semanticscholar   +1 more source

OTP with Triple DES

open access: yesInternational Journal for Research in Applied Science and Engineering Technology, 2022
: This study has been undertaken to develop a system where we can securely and efficiently share files. To maintain security between users, an authentication and authorization method is used. Users can upload files to the database.
Ashwini Shahaji, Dr.A. Rengarajan
semanticscholar   +1 more source

A Compact Cryptosystem Design of Triple-DES

open access: yesUniversity of Khartoum Engineering Journal, 2022
Symmetric encryption algorithms are widely used in the field of information security due to the rapid increasing need to pass information via computer networks and communication technology.
Murtada Mohamed Abdelwahab
semanticscholar   +1 more source

Des écrivains jumeaux : mise en abyme de l’auteur réel, en symbiose avec le personnage

open access: yesCaptures, 2017
Étude approfondie des deux seuls films sur des écrivains jumeaux que j’aie pu identifier, en vingt vingt ans de recherches sur la figure de l’écrivain. Comment et pourquoi cette configuration?
Trudy Bolter
doaj   +1 more source

Intelligent TRIPLE DES with N Round Based on Genetic Algorithm

open access: yesIraqi Journal of Science, 2019
     This work presents an approach for the applying Triple DES (TRIPLE DES) based on using genetic algorithm by adding intelligent feature for TRIPLE DES with N round for genetic algorithm.
M. Haithem, R. Lateef
semanticscholar   +1 more source

Réécriture par Leopardi du topos mythologique et littéraire du démon méridien

open access: yesCahiers d’Études Romanes, 2013
L’article se propose d’illustrer les scènes méridiennes des Canti sur la base des annotations relatives aux anciennes croyances concernant l’instant de midi contenues dans le Saggio sopra gli errori popolari degli antichi.
Andrea Natali
doaj   +1 more source

A hybrid cryptosystem approach for data security by using triple DES algorithm and ElGamal algorithm

open access: yesIOP Conference Series: Materials Science and Engineering, 2018
The Internet is the communication path used in data exchange. Nevertheless, the delivery process is often experienced disturbance caused by outsiders who are not interested.
D. Rachmawati, A. S. Harahap, R N Purba
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy