Zobrazeno 1 - 10
of 1 133
pro vyhledávání: '"Brute-force attack"'
Publikováno v:
Journal of Engineering and Applied Science, Vol 71, Iss 1, Pp 1-17 (2024)
Abstract The surge in online activities has led to the increasing popularity of sharing video data across diverse applications, including online education tutorials, social networking, video calling, and OTT platforms. Encryption prevents unauthorize
Externí odkaz:
https://doaj.org/article/b689a78914bf4f01919eef296835ffbe
Publikováno v:
Entropy, Vol 26, Iss 3, p 216 (2024)
The SAND algorithm is a family of lightweight AND-RX block ciphers released by DCC in 2022. Our research focuses on assessing the security of SAND with a quantum computation model. This paper presents the first quantum implementation of SAND (includi
Externí odkaz:
https://doaj.org/article/658f5c0a7c8548669366c80ce86e7145
Autor:
Ammar Gharbi, Ahmed Nori
Publikováno v:
Al-Rafidain Journal of Computer Sciences and Mathematics, Vol 16, Iss 1, Pp 1-14 (2022)
From time to time, we hear in the news about a breach or attack on some well-known companies as just news, but it is a serious problem because it is the privacy of citizens, their money in trade and managing their businesses and projects. In this pap
Externí odkaz:
https://doaj.org/article/a0b6c1183e4440d5a4e5dc17ef97475c
Autor:
Roayat Ismail Abdelfatah
Publikováno v:
IEEE Access, Vol 10, Pp 107152-107169 (2022)
Recently, quantum image encryption algorithms are attracting more and more attention, due to the upcoming quantum threat problem to the current cryptographic encryption algorithms with the rapid progress toward the quantum computer production. The ai
Externí odkaz:
https://doaj.org/article/6a17ee6d965a403685fe198436113426
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Mushtaq Ali, Amanullah Baloch, Abdul Waheed, Mahdi Zareei, Rimsha Manzoor, Hassam Sajid, Faisal Alanazi
Publikováno v:
IEEE Access, Vol 9, Pp 11655-11674 (2021)
The electronic applications of financial institutions like banks and insurance companies use either token-based, biometric-based, or knowledge-based password scheme to keep the confidential information of their customers safe from hackers. The knowle
Externí odkaz:
https://doaj.org/article/0303338c2f1e4667aec5b7767252faae
Publikováno v:
IEEE Access, Vol 9, Pp 103204-103229 (2021)
This paper presents a novel security approach called Anomalous Resource Consumption Detection (ARCD), which acts as an additional layer of protection to detect cyberattacks in embedded systems (ESs). The ARCD approach is based on the differentiation
Externí odkaz:
https://doaj.org/article/4ead9fbd87ef4b798f81cb4fd4c5e419
Autor:
Parveiz Nazir Lone, Deep Singh, Veronika Stoffová, Deep Chandra Mishra, Umar Hussain Mir, Neerendra Kumar
Publikováno v:
Mathematics, Vol 10, Iss 20, p 3878 (2022)
In the present era of digital communication, secure data transfer is a challenging task in the case of open networks. Low-key-strength encryption techniques incur enormous security threats. Therefore, efficient cryptosystems are highly necessary for
Externí odkaz:
https://doaj.org/article/ea8d4b1da0094504a3b9baae54f805d5