ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Computing
Technology
Computing
Education
Research
Architecture and Urbanism
Economy
Pure sciences
Social Sciences
Communication
all records (75)

Languages
English
Spanish
Portuguese
German

Countries
Indonesia
USA
Brazil
Ukraine
South Africa
Austria
Canada
Italy
Spain
Switzerland
all records (76)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (24)

Filter  
 
246.152  Articles
1 of 24.616 pages  |  10  records  |  more records»
Recent developments in smart healthcare have brought us a great deal of convenience. Connecting common objects to the Internet is made possible by the Internet of Things (IoT). These connected gadgets have sensors and actuators for data collection and tra... see more

One of the essential instruments in the cyber era is data. Therefore, maintaining data security is an important thing to do. One way that can be done to maintain data security is through cryptography. In cryptography, two basic techniques are commonly use... see more

Blockchain is used as encryption algorithm in cryptocurrency, but less researches are found to study blockchain for data encryption. Data encryption is needed to protect the data from data theft. We know about data encryption, there are RSA, LEAP, AES, an... see more

Cryptography is an encryption technique, where the data to be encrypted will be encrypted using a key to become data that is difficult to read by other parties who do not have a decryption key. The DES algorithm is a symmetric block cipher cryptographic a... see more

Blockchain is used as encryption algorithm in cryptocurrency, but less researches are found to study blockchain for data encryption. Data encryption is needed to protect the data from data theft. We know about data encryption, there are RSA, LEAP, AES, an... see more

Wireless Body Area Networks (WBANs) play an important role in healthcare system by enabling medical experts to guide patients without measuring face-to-face. The unauthorized access of medical data from WBAN controller as well as the unreliable data commu... see more

The objective of this research was to suggest some simple solution to increase database manipulation security. Based on advantage of Homomorphic encryption, user’s data in database is always encrypted by Homomorphic encryption algorithm such as Paillier. ... see more

Database kepegawaian yang baik adalah database yang terlindung dari akses orang yang tidak berkepentingan. Meskipun database sudah terlindungi dengan password, belum menjamin amannya sebuah database. Apalagi data tersebut berupa data sensitif atau data ya... see more

Data is very important its existence to be protected if the data has a value, or a specific confidentiality. There are so many techniques that can be used to secure the data, one is to apply the method Encryption and Decryption. In the Encryption Method a... see more

1 of 24.616 pages  |  10  records  |  more records»