ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Computing
Technology
Computing
Education
Economy
Pure sciences
Social Sciences
Architecture and Urbanism
Languages
Literature
all records (72)

Languages
English
Spanish
Portuguese
German
French

Countries
Indonesia
USA
Ukraine
Brazil
Italy
Austria
South Africa
Canada
Cuba
Russia
all records (78)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (24)

Filter  
 
727.642  Articles
1 of 72.765 pages  |  10  records  |  more records»
This study aims to produce a basic electronic application basic tutorial maintenance PC-based android. This research is a type of Research and Development (R & D) research using Prototype model. The application design is implemented in seven stages, namel... see more

Cryptography is a technique that is generally used in security in the process of exchanging information in the form of text messages, picture messages, or others involving two or more users. There are many types and classifications of cryptography develop... see more

This study discusses the effectiveness of using AES (Advanced Encryption Standard) and RC4 (Rivest Chipper 4) as digital data security algorithms to prevent and protect transaction data from irresponsible parties. This needs to be done because the develop... see more

Cryptography is widely used to secure data and information so that it is not easily misused by parties who are not interested in the data. One type of cryptographic algorithm is Caesar Cipher and Vigenere Cipher. Both of these algorithms are classic crypt... see more

Abstract - Maintaining the confidentiality of a message is important to do so that it can keep the message reaching a person or organization safely without being noticed by an irresponsible person. There are several methods used to maintain the security o... see more

Information technology that is increasingly developing today must be balanced with the similarity of information data. Information security is obtained by applying cryptographic techniques, Vigenere Cipher is a key symmetry algorithm that uses a substitut... see more

The development of applications that can crack passwords or data that has been secured by cryptographic algorithms has made researchers try various ways to further secure the data they have. Even though the method used is quite modern, the algorithm for b... see more

1 of 72.765 pages  |  10  records  |  more records»