ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Biology
Education
Research
Medicine / Sub specialtie
Public health
Technology
Social Sciences
Pure sciences
Computing
Computing
all records (76)

Languages
English
Portuguese
Spanish
German
French

Countries
Brazil
Indonesia
USA
Cuba
Spain
Romania
Colombia
Ukraine
Italy
South Africa
all records (84)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (24)

Filter  
 
11.604  Articles
1 of 1.161 pages  |  10  records  |  more records»
One of the most famous key exchange protocols is Diffie-Hellman Protocol (DHP) which is a widely used technique on which key exchange systems around the world depend. This protocol is simple and uncomplicated, and its robustness is based on the Discrete L... see more

In Intelligent Transport Systems (ITS), Vehicular Ad-hoc Networks (VANET) play an essential role in improving road safety and traffic efficiency. Nevertheless, due to its special characteristics like high mobility, large size of the network and dynamic to... see more

Abstrack— SMS now becomes such a need for cellular phone users to communicate to other people. But the cellular phone users do not realize that the sent messages could be intercepted or changed by an unwanted party. Therefore it requires a security in sen... see more

The computation based on DNA tile self-assembly has been demonstrated to be scalable, which is consider as a promising technique for computation. In this work, I first show how the tile self-assembly process can be used for computing the modular multiplic... see more

Dalam Kriptografi keamanan suatu pesan sangatlah penting seiring dengan berkembangnya teknologi komputer. Keamanan dalam hal pertukaran pesan/informasi pun sangat dibutuhkan. Algoritma Diffie-Hellman merupakan salah satu kunci yang dapat digunakan dalam p... see more

Cryptology is a very old science and until a few decades it was a science for government, military, secret services, and spies. Nowadays, cryptology is almost everywhere in our lives. This article reports on an epistemological analysis of the question: “I... see more

Kebutuhan masyarakat dalam saling bertukar informasi sudah tidak dapat dipungkiri lagi. Seiring dengan perkembangan teknologi, masyarakat semakin mudah untuk bertukar informasi. Salah satu contohnya menggunakan layanan pesan singkat (Short Message Service... see more

In managing a server, an administrator takes a variety of ways for ensuring the safety and cosiness of the system. One type of threat that attack on the server is done on a port that is in an open state, thus making people who do not have access rights to... see more

Cryptology is a very old science and until a few decades it was a science for government, military, secret services, and spies. Nowadays, cryptology is almost everywhere in our lives. This article reports on an epistemological analysis of the question: “I... see more

1 of 1.161 pages  |  10  records  |  more records»