Suchergebnisse - "cryptography algorithm"

  1. 1

    A Psychoanalysis of Data Privacy Maintenance Issues in Social Network using Data mining von Kaarthi, P.S Arun, Sathiyabama, Dr.S.

    ISSN: 2249-8958, 2249-8958
    Veröffentlicht: 30.10.2019
    “… A safe information sharing subject proposed in OSNs upheld figure content approach trait based and Elliptic Curve Cryptography algorithmic principle re-encryption and mystery sharing …”
    Volltext
    Journal Article
  2. 2

    Performance Enhancement of State-of-the-Art Cryptography Algorithms in the Banking Sector von Surla, Govindu, Lakshmi, R.

    Veröffentlicht: IEEE 01.09.2023
    “… Data security is a complex subject in today's world that affects both data storage and data transmission …”
    Volltext
    Tagungsbericht
  3. 3

    Comparative Analysis of Impact of Cryptography Algorithms on Wireless Sensor Networks von Bilwasiva Basu Mallick, Bhatia, Ashutosh

    ISSN: 2331-8422
    Veröffentlicht: Ithaca Cornell University Library, arXiv.org 05.07.2021
    Veröffentlicht in arXiv.org (05.07.2021)
    “… Cryptography techniques are essential for a robust and stable security design of a system to mitigate the risk of external attacks and thus improve its …”
    Volltext
    Paper
  4. 4
  5. 5

    Symmetric Block Algorithm WBC1 and Analysis of Its Implementation Complexity von Baranov, Igor

    ISSN: 2707-4501, 2707-451X
    Veröffentlicht: V.M. Glushkov Institute of Cybernetics 28.03.2025
    Veröffentlicht in Kìbernetika ta komp'ûternì tehnologìï (Online) (28.03.2025)
    “… Introduction. Nowadays, computer networks are gaining more and more importance for information exchange. Cryptography plays a vital role in the security of …”
    Volltext
    Journal Article
  6. 6

    Enhancing the Security of the Internet of Things by the Application of Robust Cryptographic Algorithms von Sruthi, M. V., Lakshminarayana, Gajula, Krishnaiah, Kondragunta Rama, Bhagyalaxmi, Ch, Chithambaraiah Setty, K., Naveen Chakravarthi, K.

    Veröffentlicht: IEEE 11.07.2025
    “… The Internet of Things (IoT) is becoming a crucial part of the Internet and the foundation for millions of intelligent, interlinked things that might subject to many types of assaults …”
    Volltext
    Tagungsbericht
  7. 7

    E-lerning concept design of rijndael encryption process von Zainuddin, Zahir, Manullang, Evanita V.

    Veröffentlicht: IEEE 01.08.2013
    “… Numbers of meeting for the subject do not enable students to learn the cryptography algorithm that make the students do not fully understand about the working way of some cryptography algorithms …”
    Volltext
    Tagungsbericht
  8. 8

    Taking Flexible and Diverse Approaches to Get Undergraduate Students Interested in Cryptography Course von Xiulli Song, Hongyao Deng

    ISBN: 1424435811, 9781424435814, 0769535577, 9780769535579
    Veröffentlicht: IEEE 01.03.2009
    “… With the extensive application of cryptography technologies in our lives, cryptography course has been paid more attention to in many universities. The …”
    Volltext
    Tagungsbericht
  9. 9

    Study and Development of a New Symmetric Key Management Scheme for Wireless Sensor Networks von Maleh, Yassine, Ezzati, Abdellah

    ISSN: 2331-8422
    Veröffentlicht: Ithaca Cornell University Library, arXiv.org 31.12.2016
    Veröffentlicht in arXiv.org (31.12.2016)
    “… The most crucial and fundamental challenge that WSN is facing is security. The primary subject of all my work is to address this issue …”
    Volltext
    Paper
  10. 10

    Prospects for Legal Regulation of Quantum Communication von Minbaleev, A., Zenin, S., Evsikov, K.

    ISSN: 2409-9058, 2412-2343
    Veröffentlicht: Publshing House V.Ема 01.01.2024
    Veröffentlicht in BRICS law journal (01.01.2024)
    “… of cryptography algorithms. In this article, this new digital technology includes quantum key distribution and encryption methods that are cryptographically resistant to a quantum computer …”
    Volltext
    Journal Article
  11. 11

    IMPLEMENTATION OF A METHOD FOR SYNTHESIZING GROUPS OF SYMMETRIC DOUBLE-OPERAND OPERATIONS OF CRYPTOGRAPHIC INFORMATION CODING FOR BLOCK ENCRYPTION SYSTEMS von Lada, Nataliia, Rudnytska, Yuliia

    ISSN: 2522-9818, 2524-2296
    Veröffentlicht: 30.09.2022
    “… The subject of the study are features of the implementation of a generalized method of synthesis groups of symmetric two-operand operations of cryptographic coding information for "lightweight cryptography …”
    Volltext
    Journal Article
  12. 12

    IMPLEMENTATION OF A METHOD FOR SYNTHESIZING GROUPS OF SYMMETRIC DOUBLE-OPERAND OPERATIONS OF CRYPTOGRAPHIC INFORMATION CODING FOR BLOCK ENCRYPTION SYSTEMS von Nataliia Lada, Yuliia Rudnytska

    ISSN: 2522-9818, 2524-2296
    Veröffentlicht: Kharkiv National University of Radio Electronics 01.06.2022
    “… The subject of the study are features of the implementation of a generalized method of synthesis groups of symmetric two-operand operations of cryptographic coding information for "lightweight cryptography …”
    Volltext
    Journal Article
  13. 13

    Research and Implementation of MQTT Security Mechanism Based on Domestic CryptographicAlgorithms von LIU Zechao, LIANG Tao, SUN Ruochen, HAO Zhiqiang, LI Jun

    ISSN: 1002-137X
    Veröffentlicht: Editorial office of Computer Science 01.02.2024
    Veröffentlicht in Ji suan ji ke xue (01.02.2024)
    “… Aiming at the problem that existing MQTT protocol lacks effective identity authentication and data plaintext transmission,an MQTT security protection scheme is designed based on domestic cryptography …”
    Volltext
    Journal Article
  14. 14

    Research and Implementation of MQTT Security Mechanism Based on Domestic Cryptographic Algorithms von Liu, Zechao, Liang, Tao, Sun, Ruochen, Hao, Zhiqiang, Li, Jun

    ISSN: 1002-137X
    Veröffentlicht: Chongqing Guojia Kexue Jishu Bu 01.02.2024
    Veröffentlicht in Ji suan ji ke xue (01.02.2024)
    “… Aiming at the problem that existing MQTT protocol lacks effective identity authentication and data plaintext transmission, an MQTT security protection scheme is designed based on domestic cryptography …”
    Volltext
    Journal Article
  15. 15

    基于国密算法的MQTT安全机制研究与实现 von 刘泽超, 梁涛, 孙若尘, 郝志强, 李俊

    ISSN: 1002-137X
    Veröffentlicht: 哈尔滨工程大学计算机科学与技术学院 哈尔滨 150001 15.02.2024
    Veröffentlicht in 计算机科学 (15.02.2024)
    “… TP309.2; 针对现有MQTT协议缺乏有效身份认证以及数据以明文形式传输的问题,提出了一种基于国密算法SM2,SM3,SM4的MQTT安全保护方案.通过SM2算法实现客户端与MQTT Broker之 …”
    Volltext
    Journal Article
  16. 16

    Introducing Cryptographic and Sorting Algorithms to Primary School Students and its Effect in the Classroom von Karakostas, Athanasios, Vlachou, Akrivi

    ISSN: 2165-9567
    Veröffentlicht: IEEE 08.05.2024
    Veröffentlicht in IEEE Global Engineering Education Conference (08.05.2024)
    “… algorithms, as well as the effect of these activities to the students' eagerness to engage with other computer science-related subjects …”
    Volltext
    Tagungsbericht
  17. 17

    Energy-efficient Hardening of the SEDIMENT Methodology for Scalable IoT Network Security von Shur, D., Di Crescenzo, G., Chen, T., Patni, Z., Lin, Y-J., Alexander, S., Flin, B., Levonas, R.

    Veröffentlicht: IEEE 02.09.2024
    “… : root of trust, remote attestation and end-to-end-secure publish-subscribe, while using resource-efficient cryptography algorithms and support of zero-trust principles …”
    Volltext
    Tagungsbericht
  18. 18

    Prime number generation using memetic programming von Mabrouk, Emad, Hernández-Castro, Julio César, Fukushima, Masao

    ISSN: 1433-5298, 1614-7456
    Veröffentlicht: Japan Springer Japan 01.06.2011
    Veröffentlicht in Artificial life and robotics (01.06.2011)
    “… , public key cryptography algorithms, hash tables, and pseudo-random number generators. One of the most popular topics to attract attention is to find a formula that maps the set of natural numbers into the set of prime numbers …”
    Volltext
    Journal Article
  19. 19

    AN INTEGRATED APPROACH TO DATA CONFIDENTIALITY IN 5G/6G BASED ON LDPC CODES AND POST-QUANTUM CRYPTOGRAPHY von Dunaiev, Sergii

    ISSN: 3083-6298, 3083-6328
    Veröffentlicht: 26.09.2025
    Veröffentlicht in Terra security (26.09.2025)
    “… Methods and models of data secrecy in 5G/6G mobile networks based on LDPC codes integrated with post-quantum cryptography algorithms, as well as the principles of their combination …”
    Volltext
    Journal Article
  20. 20

    Hifn's Latest Security Processor Yields Lowest Cost-Per-Transaction For E-Commerce Servers

    Veröffentlicht: New York PR Newswire Association LLC 05.09.2001
    Veröffentlicht in PR Newswire (05.09.2001)
    “… These forward-looking statements are subject to the risks set forth below and actual results could vary …”
    Volltext
    Newsletter