Journal articles on the topic 'Cryptographic information security tool'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cryptographic information security tool.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Hafiz Nanda Ginting, Subhan, Muhammad Rhifky Wayahdi, and Surya Guntur. "Playfair Cipher Algorithm in Learning Media." Jurnal Minfo Polgan 11, no. 1 (2022): 9–14. http://dx.doi.org/10.33395/jmp.v11i1.11560.
Full textHimmat Rathore. "Next-generation cryptographic techniques for robust network security." World Journal of Advanced Research and Reviews 11, no. 3 (2021): 496–508. https://doi.org/10.30574/wjarr.2021.11.3.0413.
Full textFarid Rieziq, Difa Pradana Prihantoro, and Eva Dwi Kurniawan. "Penggunaan Kriptografi Dalam Novel Digital Fortress (Benteng Digital) Karya dan Brown." Jurnal Teknik Mesin, Industri, Elektro dan Informatika 3, no. 1 (2023): 18–24. http://dx.doi.org/10.55606/jtmei.v3i1.3197.
Full textSingh, Mandeep. "Enhancing Data Security with KeyGuardian: Application of Fernet for Digital Asset Protection." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem34392.
Full textWidodo, Agung, and Yohan Suryanto. "CRYPTOGRAPHIC PROTOCOL SECURITY IN NATIONAL ENCRYPTION APPLICATIONS." Jurnal Teknik Informatika (Jutif) 4, no. 2 (2023): 279–90. http://dx.doi.org/10.52436/1.jutif.2023.4.2.744.
Full textUsha, S., S. Kuppuswami, and M. Karthik. "A New Enhanced Authentication Mechanism Using Session Key Agreement Protocol." Cybernetics and Information Technologies 18, no. 4 (2018): 61–74. http://dx.doi.org/10.2478/cait-2018-0048.
Full textKUMAR, K. TULASI KRISHNA, and G. MADHU NISHA. "High Security Encryption Using AES and Visual Cryptography." International Scientific Journal of Engineering and Management 04, no. 07 (2025): 1–9. https://doi.org/10.55041/isjem04733.
Full textAljohani, Abeer. "Zero-Trust Architecture: Implementing and Evaluating Security Measures in Modern Enterprise Networks." SHIFRA 2023 (July 20, 2023): 1–13. http://dx.doi.org/10.70470/shifra/2023/008.
Full textTiwari, Harshvardhan. "Merkle-Damgård Construction Method and Alternatives." Journal of information and organizational sciences 41, no. 2 (2017): 283–304. http://dx.doi.org/10.31341/jios.41.2.9.
Full textVIDAL, G., M. S. BAPTISTA, and H. MANCINI. "FUNDAMENTALS OF A CLASSICAL CHAOS-BASED CRYPTOSYSTEM WITH SOME QUANTUM CRYPTOGRAPHY FEATURES." International Journal of Bifurcation and Chaos 22, no. 10 (2012): 1250243. http://dx.doi.org/10.1142/s0218127412502434.
Full textUtomo, Rokhim, Mokhammad Syafaat, Kasiyanto Kasiyanto, Dekki Widiatmoko, and Rafi Maulana. "Cryptographic security analysis of the shift password method using the google colab application." TEKNOSAINS : Jurnal Sains, Teknologi dan Informatika 12, no. 1 (2025): 104–9. https://doi.org/10.37373/tekno.v12i1.1231.
Full textXue, Jiang, Valerii Lakhno, and Andrii Sahun. "RESEARCH ON DIFFERENTIAL CRYPTANALYSIS BASED ON DEEP LEARNING." Cybersecurity: Education, Science, Technique 3, no. 23 (2024): 97–109. http://dx.doi.org/10.28925/2663-4023.2024.23.97109.
Full textPrakash, Kuppuswamy, Qasim Yahya Al Khalidi Al-Maliki Saeed, John Rajan, Haseebuddin Mohammad, and Ali Shaik Meeran Ahmed. "A hybrid encryption system for communication and financial transactions using RSA and a novel symmetric key algorithm." Bulletin of Electrical Engineering and Informatics 12, no. 2 (2023): 1148~1158. https://doi.org/10.11591/eei.v12i2.4967.
Full textKuppuswamy, Prakash, Saeed Qasim Yahya Al Khalidi Al-Maliki, Rajan John, Mohammad Haseebuddin, and Ahmed Ali Shaik Meeran. "A hybrid encryption system for communication and financial transactions using RSA and a novel symmetric key algorithm." Bulletin of Electrical Engineering and Informatics 12, no. 2 (2023): 1148–58. http://dx.doi.org/10.11591/eei.v12i2.4967.
Full textKpieleh, Ferdinand. "Cryptographic Hash Functions For Digital Stamping." Advances in Multidisciplinary and scientific Research Journal Publication 10, no. 4 (2022): 65–72. http://dx.doi.org/10.22624/aims/digital/v10n4p9.
Full textKhairani, Lisda, Jasmiati Jasmiati, Putri Hasanah Siregar, Putri Kenangan Br Berutu, Andhika Saputra Manurung, and Alif Saka Al Bani Samosir. "Pengembangan Aplikasi Kriptografi Modern Menggunakan Algoritma Simetris DES Berbasis Python." JIKUM: Jurnal Ilmu Komputer 1, no. 1 (2025): 1–6. https://doi.org/10.62671/jikum.v1i1.36.
Full textRanjita and Gautam Kumar Rajput Dr. "Role of data security in elliptic curve cryptography." International Journal of Trends in Emerging Research and Development 1, no. 1 (2024): 281–85. https://doi.org/10.5281/zenodo.13643253.
Full textYalamanchili, Anjani, D. Venkatasekhar, and G. Vijay Kumar. "Iot Based Alzheimer’s Disease Diagnosis Model for Providing Security Using Light Weight Hybrid Cryptography." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 4 (2023): 148–59. http://dx.doi.org/10.17762/ijritcc.v11i4.6398.
Full textGolovko, G., O. Rudenko, A. Batrachenko, and R. Kyzymenko. "ORGANIZATION OF INFORMATION PROTECTION AT THE «DRIVE PETROL» ENTERPRISE USING A CRYPTOGRAPHIC ALGORITHM AES." Системи управління, навігації та зв’язку. Збірник наукових праць 1, no. 75 (2024): 50–52. http://dx.doi.org/10.26906/sunz.2024.1.050.
Full textUbochi, Chibueze Nwamouh Bashir Olaniyi Sadiq Kelechi Ukagwu John Stephen Nnamchi Ndubuisi. "A Comparative Analysis of Symmetric Cryptographic Algorithm as a Data Security Tool: A Survey." ournal of Science and Technology Research 5, no. 3 (2023): 144–68. https://doi.org/10.5281/zenodo.8313097.
Full textZakaria, Nur Hafiza, Azuan Ahmad, Azni Haslizan Ab Halim, and Farida Hazwani Mohd Ridzuan. "SECURITY ANALYSIS BETWEEN STATIC AND DYNAMIC S-BOXES IN BLOCK CIPHERS." Journal of Information System and Technology Management 6, no. 20 (2021): 10–16. http://dx.doi.org/10.35631/jistm.620002.
Full textMedeleanu, Florin. "Applied study on cryptographic functions for algorithms used in communications security protocols." Scientific Bulletin of Naval Academy XXIII, no. 1 (2020): 243–47. http://dx.doi.org/10.21279/1454-864x-20-i1-033.
Full textMolteni, Maria Chiara, and Vittorio Zaccaria. "A relation calculus for reasoning about t-probing security." Journal of Cryptographic Engineering 12, no. 1 (2022): 1–14. http://dx.doi.org/10.1007/s13389-022-00286-x.
Full textSantoso, Imam, and Yuli Christyono. "Zk-SNARKs As A Cryptographic Solution For Data Privacy And Security In The Digital Era." International Journal of Mechanical Computational and Manufacturing Research 12, no. 2 (2023): 53–58. http://dx.doi.org/10.35335/computational.v12i2.122.
Full textKwon, DeokKyu, and Youngho Park. "Design of Secure and Efficient Authentication Protocol for Edge Computing-Based Augmented Reality Environments." Electronics 13, no. 3 (2024): 551. http://dx.doi.org/10.3390/electronics13030551.
Full textCherednikova, Alla V., and Irina V. Zemlyyakova. "Concept maps as a tool for the realization of intrasubject and interdisciplinary connections in the educational process of higher education." Vestnik of Kostroma State University. Series: Pedagogy. Psychology. Sociokinetics 30, no. 2 (2024): 91–96. http://dx.doi.org/10.34216/2073-1426-2024-30-2-91-96.
Full textHulak, Hennadii. "THE COMPLEXITY OF THE FUNCTIONAL SECURITY ASSESSMENT ALGORITHM FOR INFORMATION TECHNOLOGIES FOR THE CREATION OF WARRANTY AUTOMATED SYSTEMS." Cybersecurity: Education, Science, Technique 1, no. 9 (2020): 6–23. http://dx.doi.org/10.28925/2663-4023.2020.9.623.
Full textJunior Gabriel, Arome, Boniface Kayode Alese, Adebayo Olusola Adetunmbi, Olumide Sunday Adewale, and Oluwafemi Abimbola Sarumi. "Post-Quantum Crystography System for Secure Electronic Voting." Open Computer Science 9, no. 1 (2019): 292–98. http://dx.doi.org/10.1515/comp-2019-0018.
Full textManowska, Anna, Martin Boroš, Anna Bluszcz, and Katarzyna Tobór-Osadnik. "The use of the command line interface in the verification and management of the security of IT systems and the analysis of the potential of integrating biometric data in cryptographic mechanisms." Scientific Papers of Silesian University of Technology. Organization and Management Series 2024, no. 198 (2024): 289–308. http://dx.doi.org/10.29119/1641-3466.2024.198.16.
Full textGonzález-Tablas, Ana I., María I. González Vasco, Ignacio Cascos, and Álvaro Planet Palomino. "Shuffle, Cut, and Learn: Crypto Go, a Card Game for Teaching Cryptography." Mathematics 8, no. 11 (2020): 1993. http://dx.doi.org/10.3390/math8111993.
Full textMiao, Xuyang, Chunxiang Gu, Siqi Lu, and Yanan Shi. "ESSM: Formal Analysis Framework for Protocol to Support Algebraic Operations and More Attack Capabilities." Security and Communication Networks 2021 (December 7, 2021): 1–13. http://dx.doi.org/10.1155/2021/8273172.
Full textAdeniyi, Abidemi Emmanuel, Sanjay Misra, Eniola Daniel, and Anthony Bokolo. "Computational Complexity of Modified Blowfish Cryptographic Algorithm on Video Data." Algorithms 15, no. 10 (2022): 373. http://dx.doi.org/10.3390/a15100373.
Full textA, Sevuga Pandian, and Agitha W. "ENHANCING BLOCKCHAIN SECURITY WITH AN IMPROVISED CRYPTOGRAPHIC ALGORITHM FOR SECURE TRANSACTIONS." ICTACT Journal on Communication Technology 15, no. 4 (2024): 3386–91. https://doi.org/10.21917/ijct.2024.0502.
Full textHongal, Rohini S., and Rajashekar B. Shettar. "A Power-Efficient and Quantum-Resistant N-Bit Cryptography Algorithm." International Journal of Natural Computing Research 9, no. 4 (2020): 18–33. http://dx.doi.org/10.4018/ijncr.2020100102.
Full textRiza, F., Martiano Martiano, and Farid Akbar Siregar. "Implementation Of The Arnold Catmap On A Combination Of Symmetric And Asymmetric Cryptography." Sinkron 9, no. 1 (2024): 165–73. http://dx.doi.org/10.33395/sinkron.v9i1.13175.
Full textRanasinghe, P. G. R. S., R. M. V. V. Bandara, and A. M. S. L. K. Athapaththtu. "Symmetric encryption using snake graphs and supermagic covering." Journal of the National Science Foundation of Sri Lanka 52, no. 4 (2025): 435–40. https://doi.org/10.4038/jnsfsr.v52i4.12196.
Full textKARTHIGAIKUMAR, P., and K. BASKARAN. "PARTIALLY PIPELINED VLSI IMPLEMENTATION OF BLOWFISH ENCRYPTION/DECRYPTION ALGORITHM." International Journal of Image and Graphics 10, no. 03 (2010): 327–41. http://dx.doi.org/10.1142/s0219467810003809.
Full textTarigan, Philipus Tarigan. "Use of Electronic Code Book (Ecb) Algorithm in File Security." Jurnal Info Sains : Informatika dan Sains 10, no. 1 (2020): 19–23. http://dx.doi.org/10.54209/infosains.v10i1.28.
Full textSrour, Tarek, Mohsen A. M. El-Bendary, Mostafa Eltokhy, Atef E. Abouelazm, Ahmed A. F. Youssef, and Ali M. El-Rifaie. "Lower-Complexity Multi-Layered Security Partitioning Algorithm Based on Chaos Mapping-DWT Transform for WA/SNs." Journal of Sensor and Actuator Networks 14, no. 2 (2025): 36. https://doi.org/10.3390/jsan14020036.
Full textZhao, Zi-An, Yu Sun, Dawei Li, Jian Cui, Zhenyu Guan, and Jianwei Liu. "A Scalable Security Protocol for Intravehicular Controller Area Network." Security and Communication Networks 2021 (December 31, 2021): 1–13. http://dx.doi.org/10.1155/2021/2314520.
Full textHasan, Md Mehedi, Noor Afiza Mohd Ariffin, and Nor Fazlida Mohd Sani. "LIKA: Lightweight Identity Based Key Agreement Protocol for Secure Data Transmission in Advanced Metering Infrastructure of Smart Grid." Energies 15, no. 21 (2022): 8106. http://dx.doi.org/10.3390/en15218106.
Full textChen, Zhigang, Yuting Jiang, Xinxia Song, and Liqun Chen. "A Survey on Zero-Knowledge Authentication for Internet of Things." Electronics 12, no. 5 (2023): 1145. http://dx.doi.org/10.3390/electronics12051145.
Full textHashimy, S. Q., and J. S. Magoge. "Legal Regulation of International Trade in Cryptographic Products and Technologies: WTO Tools and Regional Agreements." Journal of Digital Technologies and Law 2, no. 2 (2024): 328–44. http://dx.doi.org/10.21202/jdtl.2024.17.
Full textG., Rekha, and Srinivas V. "A NOVEL APPROACH IN HILL CIPHER CRYPTOGRAPHY." INTERNATIONAL JOURNAL OF MATHEMATICS AND COMPUTER RESEARCH 11, no. 06 (2023): 3503–5. https://doi.org/10.5281/zenodo.8095252.
Full textHiswara, Abrar, Aida Fitriyani, and Reza Adi Nugraha. "SISTEM STEGANOGRAPHY DENGAN METODE LEAST SIGNIFCANT BIT (LSB) & METODE CAESAR CIPHER BERBASIS ANDROID." Jurnal Informatika 20, no. 1 (2020): 78–88. http://dx.doi.org/10.30873/ji.v20i1.1615.
Full textBoldyreva, Alexandra, Zichen Gui, and Bogdan Warinschi. "Understanding Leakage in Searchable Encryption: a Quantitative Approach." Proceedings on Privacy Enhancing Technologies 2024, no. 4 (2024): 503–24. http://dx.doi.org/10.56553/popets-2024-0127.
Full textAlolaiyan, Hanan, Laila Latif, Umer Shuaib, Abdul Razaq, and Qin Xin. "A novel development to encrypt data communication under t-intuitionistic fuzzy environment." PLOS ONE 19, no. 9 (2024): e0308140. http://dx.doi.org/10.1371/journal.pone.0308140.
Full textBhagyalakshmi, R., Roopashree D., and Shruthi K. N. "Performance Analysis of Hybrid Cryptography System for High Security and Cloud-Based Storage." WSEAS TRANSACTIONS ON POWER SYSTEMS 17 (July 20, 2022): 244–53. http://dx.doi.org/10.37394/232016.2022.17.25.
Full textKots, Dmytro, Maksym Kudrytskyi, and Valentyna Dolia. "ISSUES OF DETERMINING THE CONTEXT OF RESTRICTED INFORMATION SECURITY." Scientific Journal of Polonia University 46, no. 3 (2021): 160–68. http://dx.doi.org/10.23856/4621.
Full textSumit, Bakane, Lande Abhijeet, and Sathe Vinayak. "A Review on Fortidrop: Cloud-Based Secure File-Sharing Tool using Cryptography." Recent Trends in Information Technology and its Application 6, no. 3 (2023): 12–15. https://doi.org/10.5281/zenodo.8050472.
Full text