Academic literature on the topic 'Cryptographic protection methods'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cryptographic protection methods.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Cryptographic protection methods"

1

Zolotareva, Irina, and Irina Gorodinskaya. "CRYPTOGRAPHIC METHODS OF INFORMATION PROTECTION." Science & World 2022, no. 1 (2022): 1–5. http://dx.doi.org/10.26526/2307-9401-2022-1-1-5.

Full text
Abstract:
The article discusses the methods of cryptographic protection of information. Methods of cryptographic protection of information are special methods of encryption, encoding or other transformation of information that make its contents inaccessible without presenting the cryptogram key and reverse transformation. Cryptographic protection is undoubtedly the most reliable method of protection, since the information itself is protected directly and there is no access to it.
APA, Harvard, Vancouver, ISO, and other styles
2

Khamalwa, Mulemi Simiyu. "Exploring how Commutative Algebra Underpins Cryptographic Protocols and Encryption Methods Used in Secure Communications and Data Protection." NEWPORT INTERNATIONAL JOURNAL OF SCIENTIFIC AND EXPERIMENTAL SCIENCES 5, no. 3 (2024): 58–62. http://dx.doi.org/10.59298/nijses/2024/10.5.586237.

Full text
Abstract:
In the dynamic realm of cybersecurity, the principles of cryptography form the bedrock of secure communication and data protection. This review delves into the pivotal role of commutative algebra in the development and implementation of cryptographic protocols. Commutative algebra, encompassing commutative rings, fields, and groups, is integral to many encryption and decryption algorithms that safeguard digital information. This review explores various algebraic structures, including modular arithmetic, finite fields, and group theory, highlighting their significance in key cryptographic proce
APA, Harvard, Vancouver, ISO, and other styles
3

Ibrokhimov, Nodirbek Ikromjonovich, and Fayozbek Fazliddin oglu Olimov. "METHODS AND MEANS OF INFORMATION PROTECTION." Research and implementation 2, no. 5 (2024): 186–93. https://doi.org/10.5281/zenodo.11485883.

Full text
Abstract:
This article explores complex approaches to information protection, focusing on organizational and technical methods, as well as cryptographic methods. Organizational and technical practices include policies, procedures, and technologies designed to mitigate risks and ensure the integrity, confidentiality, and availability of data. In addition, cryptography studies mathematical algorithms and protocols that protect data by encrypting it and ensuring that only authorized individuals have access to confidential information. Combining these strategies, the paper highlights the multifaceted nature
APA, Harvard, Vancouver, ISO, and other styles
4

Ms., Kummasani Vinodhini. "Artifical Intelligence in Cryptography: Protection of Cryptographic System under Patents." Annual International Journal on Analysis of Contemporary Legal Affairs (AIJACLA) 5 (May 25, 2025): 95–111. https://doi.org/10.5281/zenodo.15514117.

Full text
Abstract:
<em>Artificial Intelligence (AI) is transforming cryptographic approaches to encryption techniques, automating key generation, and strengthening safety mechanisms against cyber threats. Possible applications include strengthening data protection, detecting vulnerabilities, and optimizing cryptographic protocols. In particular, AI-based cryptographic models enhance the non- disable for security systems against advanced assaults, including those posed by quantum computing. Cryptography leverages AI through machine learning algorithms for anomaly detection, AI-based key management, and neural net
APA, Harvard, Vancouver, ISO, and other styles
5

Victor, Melvin, D. David Winster Praveenraj, Sasirekha R, Ahmed Alkhayyat, and Abdullayeva Shakhzoda. "Cryptography: Advances in Secure Communication and Data Protection." E3S Web of Conferences 399 (2023): 07010. http://dx.doi.org/10.1051/e3sconf/202339907010.

Full text
Abstract:
In the innovative work secure communication and data protection are being main field, which are emerged by cryptography as a fundamental pillar. Strong cryptographic methods are now essential given the rising reliance on digital technologies and the threats posed by bad actors. This abstract examines the evolution of secure communication protocols and data protection techniques as it relates to the advancements in cryptography. The development of post-quantum cryptography is the most notable development in cryptography discussed in this study. As quantum computers become more powerful, they po
APA, Harvard, Vancouver, ISO, and other styles
6

Okhrimenko, Tetiana, Serhii Dorozhynskyi, and Bohdan Horbakha. "ANALYSIS OF QUANTUM SECURE DIRECT COMMUNICATION PROTOCOLS." Computer systems and information technologies, no. 1 (March 30, 2023): 62–67. http://dx.doi.org/10.31891/csit-2023-1-8.

Full text
Abstract:
The development of modern computer technologies endangers the confidentiality of information, which is usually ensured by traditional cryptographic means. This circumstance forces us to look for new methods of protection. In view of modern trends, quantum cryptography methods can become such alternatives, which allow solving a number of important cryptographic problems, for which the impossibility of solving using only classical (that is, non-quantum) communication has been proven. Quantum cryptography is a branch of quantum informatics that studies methods of protecting information by using q
APA, Harvard, Vancouver, ISO, and other styles
7

Овчаренко, А. А. "Cryptographic methods to protect personal data in financial transactions." Modern Economy Success, no. 3 (March 27, 2024): 246–49. http://dx.doi.org/10.58224/2500-3747-2024-3-246-249.

Full text
Abstract:
цель рассмотреть актуальные проблема обеспечения экономической безопасности через применение криптографических методов защиты личных данных в финансовых транзакциях. Проанализировать современные способы защиты конфиденциальности и целостности данных в цифровой экономике, освещая последние тенденции и инновационные подходы в финансовой криптографии. Внимание уделяется анализу и внедрению эффективных криптографических алгоритмов и протоколов, способных обеспечить безопасное шифрование и аутентификацию данных, а также защиту от несанкционированного доступа и атак. В работе представлены примеры ус
APA, Harvard, Vancouver, ISO, and other styles
8

Belikova, Ksenia Michailovna. "The role of cryptography in ensuring cybersecurity and protecting information about technologies of strategic and advanced development in the context of protection of sci-tech achievements in the BRICS countries." Юридические исследования, no. 9 (September 2021): 22–62. http://dx.doi.org/10.25136/2409-7136.2021.9.36508.

Full text
Abstract:
The subject of this research is the role of cryptography in ensuring cybersecurity and protecting information about technologies of strategic and advanced development in the context of protection of sci-tech achievements in the BRICS countries. The relevance of the selected topic is substantiated by the fact that modern countries, for example, the founder of computer industry &amp;ndash; the United States along with the BRICS member-states, realize the importance and practical significance of cryptography in different spheres (military, civil) and aim to develop the means and systems of inform
APA, Harvard, Vancouver, ISO, and other styles
9

Metelkov, A. "About cryptographic information protection measures in the implementation of information technology in the solution of management problems in the social and economic systems." National Security and Strategic Planning 2020, no. 4 (2021): 68–78. http://dx.doi.org/10.37468/2307-1400-2021-2020-4-68-78.

Full text
Abstract:
In theory and in practice, there is uncertainty in the existence of measures for cryptographic protection of information due to the fuzzy legal regulation of the classification of information protection measures associated with the use of cryptographic methods and encryption (cryptographic) information protection tools to ensure the security of data automatically processed in information systems. Cryptographic methods are widely used not only to protect information from unauthorized access, but also as the basis for a number of modern information technologies. The author proposed to introduce
APA, Harvard, Vancouver, ISO, and other styles
10

Issagalyeva, Z. А., A. S. Abdiraman, N. K. Medelbayeva, L. S. Aldasheva, and A. Zh Alibek. "Comparative analysis of cryptographic methods of information protection." BULLETIN of the L.N. Gumilyov Eurasian National University. Technical Science and Technology Series 148, no. 3 (2024): 176–88. http://dx.doi.org/10.32523/2616-7263-2024-148-3-176-188.

Full text
Abstract:
This article is devoted to the study of methods for analyzing the cryptographic stability of encryption algorithms. The rapid development of encryption systems, as well as the concomitant development of their hacking, leads to the emergence of new systems with high cryptographic strength. During the work, popular encryption methods were studied according to various parameters (performance, memory size, resistance to damage, etc.), based on the results of the study, the DES and AES algorithms were selected, and its algorithm was modeled using the Cryptool 2 software product, as well as attack b
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Cryptographic protection methods"

1

Prykhodko, S. B. "Application of Nonlinear Stochastic Differential Systems for Data Protection in Audio and Graphics Files." Thesis, Sumy State University, 2015. http://essuir.sumdu.edu.ua/handle/123456789/41209.

Full text
Abstract:
Data protection in audio and graphics files is one of the significant problems in information security area. This problem is usually solved with cryptographic methods in computer systems, but new solutions are still being searched for. Application of nonlinear stochastic differential systems (SDSs) is one of such new methods [1].
APA, Harvard, Vancouver, ISO, and other styles
2

Гончаренко, В. С. "Реалізація криптографічного методу захисту інформації та збереження шифру в зображенні". Thesis, Сумський державний університет, 2014. http://essuir.sumdu.edu.ua/handle/123456789/38737.

Full text
Abstract:
В останні роки з розвитком комерційної і підприємницької діяльності збільшилося число спроб несанкціонованого доступу до конференційної інформації. Серед всього спектру методів захисту даних від небажаного доступу особливе місце займають криптографічні методи.
APA, Harvard, Vancouver, ISO, and other styles
3

Hirschi, Lucca. "Vérification automatique de la protection de la vie privée : entre théorie et pratique." Thesis, Université Paris-Saclay (ComUE), 2017. http://www.theses.fr/2017SACLN019/document.

Full text
Abstract:
La société de l’information dans laquelle nous vivons repose notamment sur notre capacité à échanger des informations de façon sécurisée. Ces échanges sécurisés sont réalisés au moyen de protocoles cryptographiques. Ils explicitent comment les différents agents communicants doivent se comporter et exploitent des primitives cryptographiques (e.g. chiffrement, signature) pour protéger les échanges. Étant donné leur prédominance et leur importance, il est crucial de s’assurer que ces protocoles accomplissent réellement leurs objectifs. Parmi ces objectifs, on trouve de plus en plus de propriétés
APA, Harvard, Vancouver, ISO, and other styles
4

Колдовський, Артем Володимирович, Артем Владимирович Колдовский, Artem Volodymyrovych Koldovskyi та К. В. Чернега. "Проблемні аспекти теоретичного осмислення криптовалюти, як явища сучасної інформаційної економіки". Thesis, Українська академія банківської справи Національного банку України, 2015. http://essuir.sumdu.edu.ua/handle/123456789/53441.

Full text
Abstract:
У статті досліджено питання теоретичного осмислення нового виду електронних грошей - криптовалюти. Особливу увагу у статті присвячено аналізу динаміки розповсюдження та обігу даного виду електронних грошей, що дозволило говорити про криптовалюту як про «електронне золото». Визначено, що на сьогоднішній день відсутня нормативно-правова база, яка б регулювала взаємовідносини між користувачами, на основі чого й відстоюється точка зору щодо необхідності не тільки детального наукового вивчення криптовалюти, але й необхідності розробки інституційних норм. Також, проведено порівняльний аналіз котирув
APA, Harvard, Vancouver, ISO, and other styles
5

Rogers, Jason Lee. "Secure distribution of open source information." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FRogers.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Юшко, Катерина Сергіївна, та Kateryna Serhiivna Yushko. "Особливості навчання учнів старших класів криптографічних методів захисту даних в умовах гурткової роботи". Master's thesis, 2020. http://repository.sspu.edu.ua/handle/123456789/9898.

Full text
Abstract:
Представлена кваліфікаційна робота присвячена визначенню особливостей навчання учнів старших класів криптографічних методів захисту даних в умовах гурткової роботи. Виявлено, що курс «КМЗІ» має своєю метою дати учням знання в галузі теоретичної криптографії та криптоаналізу. Результати роботи можуть бути використанні під час проведення гурткової роботи з курсу «Криптографічні методи захисту інформації», як додатковий матеріал для вчителя<br>The presented qualification work is devoted to definition of features of training of pupils of senior classes of cryptographic methods of data protection
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Cryptographic protection methods"

1

Bauer, Friedrich Ludwig. Decrypted secrets: Methods and maxims of cryptology. Springer, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Maksurov, Aleksey. Ensuring information security on the Internet. INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1942595.

Full text
Abstract:
The monograph examines the features of legal relations in the field of information security in the global information space. The concept of "cybersecurity" is investigated, the institutional independence of the norms of law on ensuring security in the cyber environment is substantiated from the point of view of the subject and method of legal regulation. Considerable attention is paid to the characteristics of the sources of law on ensuring information security on the Internet. Substantial proposals have been made to improve legal regulation in this area both at the national (primarily Russian
APA, Harvard, Vancouver, ISO, and other styles
3

Degano, Pierpaolo. Formal Aspects of Security and Trust: 7th International Workshop, FAST 2010, Pisa, Italy, September 16-17, 2010. Revised Selected Papers. Springer Berlin Heidelberg, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Petrov, A. a. Computer security. Cryptographic methods of protection. Book on Demand Ltd., 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gaivoronski, Alexei A., Pavel S. Knopov, Vladimir I. Norkin, and Volodymyr A. Zaslavskyi. Stochastic Modeling and Optimization Methods for Critical Infrastructure Protection 2: Methods and Tools. ISTE-Wiley, 2025. https://doi.org/10.1115/1.862smo.

Full text
Abstract:
Stochastic Modeling and Optimization Methods for Critical Infrastructure Protection is a thorough exploration of mathematical models and tools that are designed to strengthen critical infrastructures against threats – both natural and adversarial. Divided into two volumes, this first volume examines stochastic modeling across key economic sectors and their interconnections, while the second volume focuses on advanced mathematical methods for enhancing infrastructure protection. The book covers a range of themes, including risk assessment techniques that account for systemic interdependencies w
APA, Harvard, Vancouver, ISO, and other styles
6

Visual Cryptography for Image Processing and Security: Theory, Methods, and Applications. Springer, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Liu, Feng, and Wei Qi Yan. Visual Cryptography for Image Processing and Security: Theory, Methods, and Applications. Springer London, Limited, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Liu, Feng, and Wei Qi Yan. Visual Cryptography for Image Processing and Security: Theory, Methods, and Applications. Springer, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Cryptographic protection methods"

1

Ding, Sophia, Emilia Nunes, Pascal Bettendorff, and Weyde Lin. "Biometrics." In Trends in Data Protection and Encryption Technologies. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_22.

Full text
Abstract:
AbstractIn biometrics, physiological characteristics (e.g., fingerprints, facial features, voices) are measured to identify individuals. Since biometry does not share the same characteristics as other authentication techniques, such as passwords or PIN codes, it is widely used as a second-factor authentication. A fully integrated solution offers significant advantages as it aligns biometric hardware, key generation, validation, and storage with the cryptographic provider, providing a coherent control environment. As a result, designing and implementing secure biometric authentication methods r
APA, Harvard, Vancouver, ISO, and other styles
2

Weissbaum, François, and Thomas Lugrin. "Symmetric Cryptography." In Trends in Data Protection and Encryption Technologies. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_2.

Full text
Abstract:
AbstractSymmetric encryption is the most common method to guarantee the confidentiality of a message or information. Encryption is a cryptographic process that makes it impossible for anyone who needs the decryption key to gain knowledge of plaintext. It is called symmetric when it uses the same key for encryption and decryption. The required key length for symmetric encryption must be at least 256 bits to guarantee sufficient protection against brute force attacks and the possible arrival of quantum computers. To conclude, well-established cryptographic libraries implementing standard algorit
APA, Harvard, Vancouver, ISO, and other styles
3

Dharmadhikari, Chinmaya M., and Rejo Mathew. "Review of Digital Data Protection Using the Traditional Methods, Steganography and Cryptography." In Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI - 2019). Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-43192-1_54.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Blagoev, Ivan. "Method for Evaluating the Vulnerability of Random Number Generators for Cryptographic Protection in Information Systems." In Advances in High Performance Computing. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-55347-0_33.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Schaumueller-Bichl, Ingrid, and Ernst Piller. "A Method of Software Protection Based on the Use of Smart Cards and Cryptographic Techniques." In Advances in Cryptology. Springer Berlin Heidelberg, 1985. http://dx.doi.org/10.1007/3-540-39757-4_32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Penkin, Yu M., G. I. Khara, and A. A. Fedoseeva. "The New Cryptographic Method for Software and Hardware Protection of Communication Channels in Open Environments." In Data-Centric Business and Applications. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-43070-2_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Dutkiewicz, Lidia, Yuliya Miadzvetskaya, Hosea Ofe, et al. "Privacy-Preserving Techniques for Trustworthy Data Sharing: Opportunities and Challenges for Future Research." In Data Spaces. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-98636-0_15.

Full text
Abstract:
AbstractOne of the foundations of data sharing in the European Union (EU) is trust, especially in view of the advancing digitalization and recent developments with respect to European Data Spaces. In this chapter, we argue that privacy-preserving techniques, such as multi-party computation and fully homomorphic encryption, can play a positive role in enhancing trust in data sharing transactions. We therefore focus on an interdisciplinary perspective on how privacy-preserving techniques can facilitate trustworthy data sharing. We start with introducing the legal landscape of data sharing in the
APA, Harvard, Vancouver, ISO, and other styles
8

Kovalchuk, Lyudmila, and Mikhail Savchuk. "Main Directions and Basic Mathematical Ideas of Cryptographic Information Security." In Stochastic Modeling and Optimization Methods for Critical Infrastructure Protection 2: Methods and Tools. ISTE-Wiley, 2025. https://doi.org/10.1115/1.862smo_ch9.

Full text
Abstract:
This chapter considers basic concepts, methods and main directions of cryptographic security of information. The conceptual principles of design and investigation of classical ciphers, along with the basic results of Shannon’s theory of secret systems, are presented. The main characteristics of modern symmetric block and stream cryptographic systems, ideas of public key cryptography, properties of one-way functions and one-way functions with a secret scheme of the first algorithms of asymmetric cryptography are described.
APA, Harvard, Vancouver, ISO, and other styles
9

Thenmozhi, R., D. Vetriselvi, and A. Arokiaraj Jovith. "Neuro-Inspired Algorithms to Enhance Cryptography." In Machine Learning and Cryptographic Solutions for Data Protection and Network Security. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-4159-9.ch006.

Full text
Abstract:
Neurocryptology objective is to create novel and creative approaches to improve the security of cryptographic systems by incorporating knowledge from neuroscience, particularly the study of the cognitive functions of the human brain. Instead of using mathematical methods and keys to secure communication and data, neurocryptology makes use of knowledge about how the brain processes information and spots patterns. The form and operation of neural networks and biological brains serve as inspiration for neural-inspired algorithms, which have the potential to improve cryptography in several ways. E
APA, Harvard, Vancouver, ISO, and other styles
10

Aarthi, S., K. Aravinthan, R. N. Ravikumar, N. Sivakumar, and Soram Wanglen. "Cryptography Securing Data in Motion Within Blockchain, Internet of Everything, and Federated Learning." In Convergence of Blockchain, Internet of Everything, and Federated Learning for Security. IGI Global, 2025. https://doi.org/10.4018/979-8-3373-1424-2.ch002.

Full text
Abstract:
Data protection relies on cryptography to secure data across Blockchain, IoE, and Federated Learning systems. Strong cryptographic methods ensure confidentiality, authenticity, and integrity, safeguarding evolving digital security needs. Key techniques include symmetric and asymmetric encryption, hash functions, digital signatures, and zero-knowledge proofs. Cryptography enables secure protocols like TLS, homomorphic encryption, and differential privacy while addressing quantum-resistant security challenges, ensuring robust digital privacy solutions.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Cryptographic protection methods"

1

Bashminova, Daria, Mansur Gergokov, and Vsevolod Ovchinnikov. "Cryptography methods in protecting financial transactions." In 2024 IEEE 65th International Scientific Conference on Information Technology and Management Science of Riga Technical University (ITMS). IEEE, 2024. http://dx.doi.org/10.1109/itms64072.2024.10741926.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jovanović, Boriša, Ivan Tot, and Silvana Ilić. "Contemporary cryptography: Recent achievement and research perspectives." In 11th International Scientific Conference on Defensive Technologies - OTEX 2024. Military Technical Institute, Belgrade, 2024. http://dx.doi.org/10.5937/oteh24067j.

Full text
Abstract:
In modern times, cryptography has been considered as a branch of both mathematics and computer science, and is tightly related to information security. With the accelerated progress of the Internet and the increase of digital communication, the need for stronger and more effective methods of cryptographic protection has become more pronounced. With the rapid increase in computing power, the potential for breaking cryptographic algorithms also increases. This fact in modern cryptography creates a need for stronger and more advanced cryptographic algorithms. One development direction of modern c
APA, Harvard, Vancouver, ISO, and other styles
3

Aleksandrov, Boncho, and Eftim Kilifarev. "Using methods for compressing information like instrument of cryptographic protection." In the conference. ACM Press, 2000. http://dx.doi.org/10.1145/365143.365379.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Filipova-Petrakieva, Simona, and Svetlin Shopov. "Educational Application for Information Protection with the use of Cryptographic Methods - part I." In 2021 XXX International Scientific Conference Electronics (ET). IEEE, 2021. http://dx.doi.org/10.1109/et52713.2021.9579924.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Makarenko, Pavlo, Vladyslav PhD Khotunov, and Natalya Falchenko. "Exploring the Application of Cryptographic Protection Methods in Information Networks Using Crypto Wallets." In INFORMATION TECHNOLOGIES AND MANAGEMENT. Baltija Publishing, 2024. http://dx.doi.org/10.30525/978-9934-26-459-7-22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bykov, S. V. "Laboratory work “non-cryptographic methods and means for information protection in telephone channels”." In 2008 9th International Scientific-Technical Conference on Actual Problems of Electronic Instrument Engineering (APEIE). IEEE, 2008. http://dx.doi.org/10.1109/apeie.2008.4897114.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Filipova-Petrakieva, Simona, and Svetlin Shopov. "Educational Windows Presentation Foundation and XAML Application for Information Protection based on the Cryptographic Methods – part II." In 2021 13th Electrical Engineering Faculty Conference (BulEF). IEEE, 2021. http://dx.doi.org/10.1109/bulef53491.2021.9690842.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Palaniappan, Janaki Raman. "Crypto your Belongings by Two Pin Authentication using Ant Algorithm based Technique." In 3rd International Conference on Artificial Intelligence and Machine Learning (CAIML 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.121210.

Full text
Abstract:
Everyone realize data is one of the important strategic for any company to run and win the business. Let it be a mobile apps, websites and so on, there are more chances that our personal data like images, videos, texts get expose while we share across for different purposes. Even though the company says app, website forms are encrypted, the said company itself uses the data internally for their business development. This research presents how one can secure own’s data themselves before sending. There are many cryptography methods that has evolved from time to time. Upon researching and analyzi
APA, Harvard, Vancouver, ISO, and other styles
9

PARASKEVOV, HRISTO, and EKREM MEHMEDOV. "STEGANOGRAPHIC PROGRAM WITH A GRAPHICAL INTERFACE FOR DATA PROTECTION IN SOCIAL NETWORKS." In INTERNATIONAL SCIENTIFIC CONFERENCE MATHTECH 2022. Konstantin Preslavsky University Press, 2022. http://dx.doi.org/10.46687/jnvu5241.

Full text
Abstract:
The article offers different combinations of cryptographic and steganographic algorithms. The cryptographic algorithms of Caesar, Fernet and RSA are considered and programmatically implemented. The LSB method was used as a basis for the steganographic algorithms, as it was used in various modifications in order to increase the invisibility and detectability of the hidden message. Experimental results show that the use of a combination of cryptographic and steganographic algorithms on social networks increases the security and undetectability of secret messages.
APA, Harvard, Vancouver, ISO, and other styles
10

Grace, A. A., V. V. Kalitina, D. R. Idrisova, D. M. Skryabin, K. P. Lukyanov, and A. P. Engel. "Blockchain technology as a method of data protection in modern conditions." In IV All-Russian (National) Scientific Conference "Achievements of Science and Technology". Krasoyarsk Science & Technology City Hall, 2025. https://doi.org/10.47813/dnit.4.2025.3019.

Full text
Abstract:
This article examines blockchain technology as a promising tool for ensuring information security amid growing cyber threats and increasing volumes of digital data. The study analyzes the key principles of blockchain, including decentralization, cryptographic protection, data immutability, and transparency, as well as their impact on the resilience of data storage and transmission systems. Major cyber threats such as malware, phishing, DDoS attacks, and SQL injections are identified, alongside an overview of traditional security measures. Particular attention is given to the advantages of bloc
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Cryptographic protection methods"

1

Gudimov, V. N., and S. G. Samochvalova. Software visualization of cryptographic protection methods. Ailamazyan Program Systems Institute of Russian Academy of Sciences, 2025. https://doi.org/10.12731/ofernio.2025.25460.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Manral, V., M. Bhatia, J. Jaeggli, and R. White. Issues with Existing Cryptographic Protection Methods for Routing Protocols. RFC Editor, 2010. http://dx.doi.org/10.17487/rfc6039.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!