Zobrazeno 1 - 10
of 144
pro vyhledávání: '"International Data Encryption Algorithm"'
Publikováno v:
Materials Today: Proceedings. 81:931-936
The cloud server stores its unique DE-duplicate data replication cloud storage system as outsourced only data copies. Deduplication cloud storage audits can verify the integrity of data stored in the cloud, while the cloud calculates the need to main
Autor:
Firdous Kausar
Publikováno v:
Egyptian Informatics Journal, Vol 22, Iss 4, Pp 447-453 (2021)
Health related information of an individual is very sensitive and demands a high level of security and privacy. Healthcare providers have the responsibility to ensure that patient information is secure and accessible only to authorized users. Healthc
Publikováno v:
Jurnal Nasional Komputasi dan Teknologi Informasi (JNKTI). 4:50-56
One of the algorithms in cryptography that can be used for school database security is the IDEA (International Data Encryption Algorithm) algorithm. The IDEA algorithm is one of the cryptographic algorithms that has various applications in secure dat
Autor:
Mohammad Qatawneh, Ahmad Bany Doumi
Publikováno v:
International Journal of Network Security & Its Applications. 11:41-51
Distributed security is an evolving sub-domain of information and network security. Security applications play a serious role when data exchanging, different volumes of data should be transferred from one site to another safely and at high speed. In
Autor:
G. Mallikharjuna Rao
Hackers are usually prepared to hack confidential documents for their vested interests. The most difficult task is to establish a secure link between the secret message and image quality. The proposed scheme combines cryptography and image steganogra
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::57e6407e591fb0104ed2cbd1c723fb17
https://doi.org/10.9734/bpi/aaer/v16/9851d
https://doi.org/10.9734/bpi/aaer/v16/9851d
Autor:
P.Devi Pradeep, Dr.A.Kamala Kumari
Publikováno v:
International Journal of Engineering Trends and Technology. 67:31-34
Autor:
Sara M. Hassan, Gihan Gomah Hamza
The data encryption is one of the most critical issues in the communication system design. Nowadays, many encryption algorithms are being updated to keep pace with the remarkable progress in the communication field. The advanced encryption standard (
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::427fd91de158a1123dc7ee4fd5940d0d
https://zenodo.org/record/7080567
https://zenodo.org/record/7080567
Publikováno v:
Lecture Notes in Networks and Systems ISBN: 9789813343542
Image security is one of the prominent research areas in the field of information security. In this paper, a new image encryption method called hybrid international data encryption algorithm (HIDEA) is proposed. In the proposed methodology, image enc
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4006cc3edf86b6a93d714554c089cf31
https://doi.org/10.1007/978-981-33-4355-9_35
https://doi.org/10.1007/978-981-33-4355-9_35
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9789811560668
Web services are the main components for business communications these days. They provide communication between client and server through XML tags. The increasing number of vulnerabilities in XML tags demands much secured and efficient techniques. Se
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::132572b9d63381f1eb542aa458470a1c
https://doi.org/10.1007/978-981-15-6067-5_67
https://doi.org/10.1007/978-981-15-6067-5_67
Publikováno v:
SN Computer Science. 1
Satisfiability modulo theories (SMT) is a powerful framework for solving constraint satisfaction problem expressed in first-order logic and mainly used for software and hardware verification. In this article, we demonstrate the power of SMT solvers i