Zobrazeno 1 - 10
of 14
pro vyhledávání: '"Hamza Touil"'
Publikováno v:
IEEE Access, Vol 12, Pp 5212-5221 (2024)
In this work, we propose a novel approach to enhancing the security of passwords before storing them in databases. Our method utilizes Braille transformation to encrypt the password after generating the corresponding hash. The hash is divided into mu
Externí odkaz:
https://doaj.org/article/3a2fc6e4380642fc87995739977085f4
Publikováno v:
Digital Technologies and Applications ISBN: 9783031298561
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f21879b64a79b0f41a26932f57ce9df7
https://doi.org/10.1007/978-3-031-29857-8_55
https://doi.org/10.1007/978-3-031-29857-8_55
Publikováno v:
WSEAS TRANSACTIONS ON COMMUNICATIONS. 20:52-62
Much of the Internet's communication is encrypted, and its content is only accessible at two endpoints, a client and a server. However, any encryption requires a key that must be negotiated without being revealed to potential attackers. The so-called
Publikováno v:
International Journal of Safety and Security Engineering. 10:785-796
Passwords/passphrases can be either system generated or user-selected. A combination of both approaches is also possible—encryption created by the system and assigned to the user by the information system meeting the policy requirements. Policy rul
Publikováno v:
Proceedings of the 5th International Conference on Big Data and Internet of Things ISBN: 9783031079689
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7eec47728a1d6d0d5bc12da6a9832e78
https://doi.org/10.1007/978-3-031-07969-6_12
https://doi.org/10.1007/978-3-031-07969-6_12
Publikováno v:
Digital Technologies and Applications ISBN: 9783031024467
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::bc64e0fe54b06e9f2876ff7be8890d60
https://doi.org/10.1007/978-3-031-02447-4_25
https://doi.org/10.1007/978-3-031-02447-4_25
Publikováno v:
Digital Technologies and Applications ISBN: 9783030738815
The hash function is designed to fold an input array of any size into a bit string. For the MD5, this is a very convenient algorithm for comparison and storage. For example, Unix systems use it to store user passwords in a 128-bit encrypted format. I
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a3994bf005b803da805696b1d6953b71
https://doi.org/10.1007/978-3-030-73882-2_45
https://doi.org/10.1007/978-3-030-73882-2_45
Publikováno v:
2020 International Conference on Intelligent Systems and Computer Vision (ISCV).
Cryptography is a method of controlling and protecting communications, which has been used exclusively in areas that require confidentiality. Today it is undergoing a considerable evolution, and computer networks require a phase of cryptography as a
Autor:
Saad Motahhir, Badre Bossoufi
This book presents volume 1 of selected research papers presented at the fourth International Conference on Digital Technologies and Applications (ICDTA'24). Highlighting the latest innovations in digital technologies as: artificial intelligence, Int
This book describes the potential contributions of emerging technologies in different fields as well as the opportunities and challenges related to the integration of these technologies in the socio-economic sector. In this book, many latest technolo