ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Computing
Computing
Technology
Pure sciences
Mining Engineering
Biology
Mathematics
Research
Electrical and electronic
Industrial engineer
all records (22)

Languages
English

Countries
USA
Indonesia
Ukraine
Romania
Croatia
Bosnia Herzegovina
Denmark
State of palestine
India
Pakistan
all records (19)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (18)

Filter  
 
82  Articles
1 of 9 pages  |  10  records  |  more records»
Protecting data and its communication is a critical part of the modern network. The science of protecting data, known as cryptography, uses secret keys to encrypt data in a format that is not easily decipherable. However, most commonly secure logons for a... see more

In this study, it is made new generalizations by adding a security parameter "n" to NTRU cryptosystem. These generalizations are analyzed in three categories. The rst category claries summative generalization, the second category explains a multiplic... see more

Security of information at this point becomes easier to be abused by another party when that information is sent and stored. To overcome these problems then do research to create an application that uses a hybrid method cryptosystem and digital signature.... see more

Based on the arithmetic of the endomorphisms ring End( , the paper constructs an exponent type encryption and decryption cryptosystem. Althought involving more operations in encryption and decryption phases  than that of original RSA one, the cryptos... see more

Abstrak – Permasalahan yang ada saat ini seperti keamanan, kerahasiaan, keaslian dan integritas file merupakan aspek-aspek penting yang perlu dilakukan untuk menjaga informasi dari pihak-pihak yang tidak memiliki otoritas atau hak akses. Untuk mengatasi h... see more

Along with the times, the exchange of information is becoming faster. People now use chat applications as a form of communication. With this application, users can easily exchange messages, whether in the form of text, images, audio, or video, without bei... see more

Abstract - System security is an absolute requirement that must be considered by users, especially network administrators to protect data. Every time a system is maintained and monitored, an administrator requires remote access such as a secure shell (SSH... see more

Public key cryptosystems are secure only when the authenticity of the public key is assured. Shao proposeda new scheme to overcome the problems of the existing schemes, which suffers from two major drawbacks. Thefirst drawback is the availability of users... see more

The present paper deals with the basic principle and theory behind prevalent classification models and their judicious application for symmetric key cryptosystem identification. These techniques have been implemented and verified on varieties of known and... see more

1 of 9 pages  |  10  records  |  more records»