ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Economy
Technology
Research
Administration - Business
Education
Computing
Social Sciences
Agronomy and forestry
Computing
Architecture and Urbanism
all records (74)

Languages
English
Spanish
Portuguese
German
French

Countries
Indonesia
USA
Brazil
Ukraine
South Africa
Italy
Romania
Switzerland
Spain
Canada
all records (80)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (24)

Filter  
 
9.521  Articles
1 of 953 pages  |  10  records  |  more records»
The object of research is the processes of building operations for cryptographic protection of information, as the requirements for information security are constantly increasing. Increasing the stability of cryptographic transformations directly depends ... see more

The object of research is the processes of building operations for cryptographic protection of information, as the requirements for information security are constantly increasing. Increasing the stability of cryptographic transformations directly depends ... see more

In this study, has shown how to design asymmetric encryption algorithm based on using two pseudorandom number generators and the features of crossover and mutation operations of Genetic algorithm (GA).the roles  of pseudorandom number generators, in... see more

Cryptography is a technique used today hiding any confidential information from the attack of an intruder. Today data communication mainly depends upon digital data communication, where prior requirement is data security, so that data should reach to the ... see more

ElGamal as an asymmetric key cryptography system and Data Encryption Standard (DES) as a symmetric key cryptography system, both of algorithms will be compared using the time complexity analysis and computer simulation. The result of time analysis shows a... see more

Now-a-days Healthcare Sectors to create acloud computing environment to obtain a patient's complete medical record. This environment reduces time consuming efforts and other costly operations and uniformly integrates collection of medical data to deliver ... see more

MANETs are considered as suitable for commercial applications such as law enforcement, conference meeting, and sharing information in a student classroom and critical services such as military operations, disaster relief, and rescue operations. Meanwhile,... see more

Data protection is representing a huge trade in the modern era; the vast communication development gave this field increased attention from all sorts of parties (friends and foes); integral transforms have played a decent role in many methods that are pro... see more

In digital computing, cryptographic methods considers performance in both speed and security. This study aims to explore and improve a permutation-based symmetric chaotic cryptography technique called Chaotic Permutation Multicircular (CPMC). In this stud... see more

1 of 953 pages  |  10  records  |  more records»