Journal articles on the topic 'Triple Data Encryption Standard (3-DES)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 19 journal articles for your research on the topic 'Triple Data Encryption Standard (3-DES).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Singh, Pankaj, and Sachin Kumar. "Study & analysis of cryptography algorithms : RSA, AES, DES, T-DES, blowfish." International Journal of Engineering & Technology 7, no. 1.5 (December 31, 2017): 221. http://dx.doi.org/10.14419/ijet.v7i1.5.9150.
Full textRatnadewi, Roy Pramono Adhie, Yonatan Hutama, A. Saleh Ahmar, and M. I. Setiawan. "Implementation Cryptography Data Encryption Standard (DES) and Triple Data Encryption Standard (3DES) Method in Communication System Based Near Field Communication (NFC)." Journal of Physics: Conference Series 954 (January 2018): 012009. http://dx.doi.org/10.1088/1742-6596/954/1/012009.
Full textKe, Chih Kun, and Zheng Hua Lin. "Secure Data Synchronization over a Mobile Peer-to-Peer Network." Applied Mechanics and Materials 764-765 (May 2015): 950–54. http://dx.doi.org/10.4028/www.scientific.net/amm.764-765.950.
Full textAhmad, Amal, and Shereen Ismail. "User Selective Encryption Method for Securing MANETs." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 5 (October 1, 2018): 3103. http://dx.doi.org/10.11591/ijece.v8i5.pp3103-3111.
Full textRaza, Asif, Muhammad Tanveer Meeran, and Muizzud din. "Routine of Encryption in Cognitive Radio Network." July 2019 38, no. 3 (July 1, 2019): 609–18. http://dx.doi.org/10.22581/muet1982.1903.07.
Full textSwamy Varkuti, Kumara, and Prabhu Benakop. "VLSI Design flow for Secure Integrated Circuits based on DES, TDES, AES and Blowfish Algorithms and their performance." International Journal of Engineering & Technology 7, no. 2.16 (April 12, 2018): 94. http://dx.doi.org/10.14419/ijet.v7i2.16.11424.
Full textVennela, Vasireddy. "Lightweight Cryptography Algorithms for IOT Devices." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 20, 2021): 1678–83. http://dx.doi.org/10.22214/ijraset.2021.35358.
Full textSermakani, A. M., and D. Paulraj. "Effective Data Storage and Dynamic Data Auditing Scheme for Providing Distributed Services in Federated Cloud." Journal of Circuits, Systems and Computers 29, no. 16 (June 22, 2020): 2050259. http://dx.doi.org/10.1142/s021812662050259x.
Full textM. El-Medany, Wael. "A cost-effective programmable SoC for network security using Xilinx Spartan 3AN FPGA." Journal of Engineering, Design and Technology 12, no. 2 (April 29, 2014): 280–91. http://dx.doi.org/10.1108/jedt-01-2011-0008.
Full textAkhirianto, Pas Mahyu, Anita B. Wandanaya, and Opan Mustopah. "PERANCANGAN APLIKASI ENKRIPSI DAN DEKRIPSI FILE BERBASIS WEB." Journal CERITA 2, no. 2 (August 1, 2016): 214–25. http://dx.doi.org/10.33050/cerita.v2i2.699.
Full textPriyanto, Dadang, and Raesul Azhar. "Sistem Aplikasi Untuk Keamanan Data Dengan Algoritma 'Des' (Data Encryption Standard)." Jurnal Matrik 16, no. 1 (July 26, 2017): 67. http://dx.doi.org/10.30812/matrik.v16i1.12.
Full textLalita Kumar Parvataneni, Mohith, Eswara Sai Nath Adusumalli, and Rajeshbabu C. "Secure and Efficient Query Processing Using Randomized Encryption and De-duplication on the Cloud." International Journal of Engineering & Technology 7, no. 2.24 (April 25, 2018): 311. http://dx.doi.org/10.14419/ijet.v7i2.24.12071.
Full textYesina, M. V., and B. S. Shahov. "Analysis of hardware implementations of electronic signature algorithms qTesla, Crystals-Dilitium and MQDSS at different levels of security." Radiotekhnika, no. 205 (July 2, 2021): 42–52. http://dx.doi.org/10.30837/rt.2021.2.205.04.
Full textWinafil, Mahadi, Sinar Sinurat, and Taronisokhi Zebua. "IMPLEMENTASI ALGORITMA ADVANCED ENCRYPTION STANDARD DAN TRIPLE DATA ENCRYPTION STANDARD UNTUK MENGAMANKAN CITRA DIGITAL." KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) 2, no. 1 (October 6, 2018). http://dx.doi.org/10.30865/komik.v2i1.975.
Full textRahmad, Cahya, Kohei Arai, Arief Prasetyo, and Novriza Arizki. "Noble Method for Data Hiding using Steganography Discrete Wavelet Transformation and Cryptography Triple Data Encryption Standard: DES." International Journal of Advanced Computer Science and Applications 9, no. 11 (2018). http://dx.doi.org/10.14569/ijacsa.2018.091136.
Full text"Machine Learning Based Efficient and Secure Storage Mechanism in Cloud Computing." International Journal of Innovative Technology and Exploring Engineering 9, no. 5 (March 10, 2020): 195–99. http://dx.doi.org/10.35940/ijitee.d1359.039520.
Full text"A Retrospect of Prominent Cloud Security Algorithms." International Journal of Innovative Technology and Exploring Engineering 9, no. 3 (January 10, 2020): 749–55. http://dx.doi.org/10.35940/ijitee.c8338.019320.
Full text"DNA Computing Based Encryption Algorithm for Wireless Multimedia Communication System." International Journal of Innovative Technology and Exploring Engineering 9, no. 3 (January 10, 2020): 1441–45. http://dx.doi.org/10.35940/ijitee.b7719.019320.
Full text"A Framework for Secure Data Storage and Retrieval in Cloud Environment." International Journal of Engineering and Advanced Technology 9, no. 2 (December 30, 2019): 2511–20. http://dx.doi.org/10.35940/ijeat.b3794.129219.
Full text