Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: Digital Signature Algorithm confidentiality.

Artykuły w czasopismach na temat „Digital Signature Algorithm confidentiality”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Digital Signature Algorithm confidentiality”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.

1

Dhanashree, Toradmalle, Muthukuru Jayabhaskar, and Sathyanarayana B. "Certificateless and provably-secure digital signature scheme based on elliptic curve." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 4 (2019): 3228–31. https://doi.org/10.11591/ijece.v9i4.pp3228-3231.

Pełny tekst źródła
Streszczenie:
With the internet today available at the user’s beck, and call data or Information Security plays a vital role. Confidentiality, Integrity, Availability, and Non-repudiation are the pillars of security on which every application on the web is based on. With these basic requirements the users also need the security in low resource constrained environments making it more challenging for the security experts to design secured cryptographic algorithms. Digital Signatures play a pivotal role in Authentication. They help in verifying the integrity of the data being exchanged. Elliptical curves
Style APA, Harvard, Vancouver, ISO itp.
2

Toradmalle, Dhanashree, Jayabhaskar Muthukuru, and B. Sathyanarayana. "Certificateless and provably-secure digital signature scheme based on elliptic curve." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 4 (2019): 3228. http://dx.doi.org/10.11591/ijece.v9i4.pp3228-3231.

Pełny tekst źródła
Streszczenie:
With the internet today available at the user’s beck, and call data or Information Security plays a vital role. Confidentiality, Integrity, Availability, and Non-repudiation are the pillars of security on which every application on the web is based on. With these basic requirements the users also need the security in low resource constrained environments making it more challenging for the security experts to design secured cryptographic algorithms. Digital Signatures play a pivotal role in Authentication. They help in verifying the integrity of the data being exchanged. Elliptical curves are t
Style APA, Harvard, Vancouver, ISO itp.
3

Octora Ginting, Ferraro S., Veithzal Rivai Zainal, and Aziz Hakim. "Digital Signature Standard Implementation Strategy by Optimizing Hash Functions Through Performance Optimization." Journal of Accounting and Finance Management 3, no. 6 (2023): 362–71. http://dx.doi.org/10.38035/jafm.v3i6.175.

Pełny tekst źródła
Streszczenie:
Security method of data transmission process has been growing rapidly with the science of cryptography. Cryptography can provide security services that includes security aspects like confidentiality, data integrity, authentication and non-repudiation. Modern cryptography uses a key that must be kept secret to overcome the problem of cryptographic security. Problem in the use of the same key by two entities that communicate with each other in exchanging messages is a way to distribute the key. This problem can be overcome by using public-key cryptography, which allows users to communicate secur
Style APA, Harvard, Vancouver, ISO itp.
4

Hoang, Sy Tuong, Quang Trung Do, and Nhu Quynh Luc. "Build a Blockchain-based confidentiality and privacy solution using cryptographic techniques." Ministry of Science and Technology, Vietnam 65, no. 3 (2023): 1–6. http://dx.doi.org/10.31276/vjst.65(3).01-06.

Pełny tekst źródła
Streszczenie:
This study aims to apply security problems such as homomorphic encryption algorithm, elliptic curve digital signature algorithm, and secure hash algorithms in building your own bitcoin virtual currency based on the Blockchain system; while still ensuring the confidentiality and privacy of the generated bitcoin virtual currency. The result achieved by the author team, who created their virtual currency bitcoin, has integrated security techniques (including secure hash algorithms with a length size of 256 bits; elliptic curve digital signature algorithm with a length size of 384 bits; full homom
Style APA, Harvard, Vancouver, ISO itp.
5

Nadzifarin, Aulia, and Asmunin Asmunin. "Penerapan Elliptic Curve Digital Signature Algorithm pada Tanda Tangan Digital dengan Studi Kasus Dokumen Surat – Menyurat." Journal of Informatics and Computer Science (JINACS) 4, no. 01 (2022): 1–9. http://dx.doi.org/10.26740/jinacs.v4n01.p1-9.

Pełny tekst źródła
Streszczenie:
Changes in the pattern of human life through electronic digital media are the impact of very rapid technological developments, one of which is the change in patterns from paper to paperless. At the same time as the COVID-19 pandemic, which affected policies in most areas of employment and education, this was done online, so electronic documents were often used in every process in these fields. As in the case of administrative correspondence or other document exchange transactions. And the authenticity of the document is needed by using a mechanism, one of which is a digital signature. Digital
Style APA, Harvard, Vancouver, ISO itp.
6

Indah Lestari, Rahayu, Vera Suryani, and Aulia Arif Wardhana. "Digital Signature Method to Overcome Sniffing Attacks on LoRaWAN Network." International journal of electrical and computer engineering systems 13, no. 7 (2022): 533–39. http://dx.doi.org/10.32985/ijeces.13.7.5.

Pełny tekst źródła
Streszczenie:
LoRa or Long Range with LoRaWAN technology is a protocol for low-power wireless networks. The absence of an encryption process on the data payload becomes a challenge for the LoRaWAN network. When the process of sending messages is running inter devices, sniffing might occur, thereby reducing the confidentiality aspect of the data communication process. This paper optimized the digital signature method to secure messages sent by LoRaWAN network devices, along with Advanced Encryption Standard (AES) algorithm and Ed25519 algorithm. AES was used for message encryption, while Ed25519 was used for
Style APA, Harvard, Vancouver, ISO itp.
7

MUSTAFA, HUSSEIN, ELHADY MAHMOUD ABD, HAMDY SARA, and ALSOBKY WAGEDA. "DESIGNING NEW TECHNIQUE IN DIGITAL SIGNATURE BASED ON GALOIS FIELD 2n AND CHAOTIC MAPS." Seybold Report Journal 18, no. 09 (2023): 53–72. https://doi.org/10.5281/zenodo.8344314.

Pełny tekst źródła
Streszczenie:
Abstract Ensuring the utmost security, confidentiality, and integrity of digital communications has become an imperative requirement in today's world. This realization highlights the significance of employing Digital Signature Algorithms (DSA) in various online applications. DSA's true value lies in its ability to deliver secure digital signatures, assuring the verification of digital documents, messages, or transactions. This aspect holds paramount importance in critical domains such as online banking, e-commerce, digital contracts, and government services where safeguarding sensitive
Style APA, Harvard, Vancouver, ISO itp.
8

Paulus, Erick, and Mochamad Azmi Fauzan. "A Framework to Ensure Data Integrity and Safety." Data Science: Journal of Computing and Applied Informatics 2, no. 1 (2018): 1–11. http://dx.doi.org/10.32734/jocai.v2.i1-90.

Pełny tekst źródła
Streszczenie:
The technology development allows people to more easily communicate and convey information. The current communication media can facilitate its users to send and receive digital data, such as text, sound or digital image. But in terms of security, communications media not always ensure the confidentiality and authentication of data traffic. Most people rely solely on the security provided by the communications media providers in securing their data, which is essentially still inadequate. This paper presents the development of a data security framework by applying the principles of cryptography
Style APA, Harvard, Vancouver, ISO itp.
9

Sun, Feifei, and Guohong Shi. "Application Research in Computer Vision Signature Encryption System of Enterprise Contract Economic Management." Wireless Communications and Mobile Computing 2022 (May 13, 2022): 1–5. http://dx.doi.org/10.1155/2022/9677942.

Pełny tekst źródła
Streszczenie:
This paper mainly proposes a nonrepudiation digital signature authentication scheme based on an enterprise contract computer vision system. Based on the RSA algorithm and MD5 message-digest algorithm, a digital signature scheme of enterprise economic contract based on IC card is proposed. The method realizes digital signature and ensures the confidentiality of the transmitted data. Finally, this paper proposes a concrete digital signature experiment system implemented in Java. The results of this study show that the computer vision signature encryption system helps to improve the reliability o
Style APA, Harvard, Vancouver, ISO itp.
10

Sihombing, Grace Lamudur Arta. "HYBRID CHRIPTOGRAPHY STREAM CIPHER AND RSA ALGORITHM WITH DIGITAL SIGNATURE AS A KEY." InfoTekJar (Jurnal Nasional Informatika dan Teknologi Jaringan) 1, no. 2 (2017): 75–83. http://dx.doi.org/10.30743/infotekjar.v1i2.66.

Pełny tekst źródła
Streszczenie:
Confidentiality of data is very important in communication. Many cyber crimes that exploit security holes for entry and manipulation. To ensure the security and confidentiality of the data, required a certain technique to encrypt data or information called cryptography. It is one of the components that can not be ignored in building security. And this research aimed to analyze the hybrid cryptography with symmetric key by using a stream cipher algorithm and asymmetric key by using RSA (Rivest Shamir Adleman) algorithm. The advantages of hybrid cryptography is the speed in processing data using
Style APA, Harvard, Vancouver, ISO itp.
11

Kumar, Pankaj, Saurabh Kumar Sharma, and Kaveri Umesh Kadam. "Empirical Evaluation of ECC Batch Verification Algorithms of Digital Signature in Wireless Sensor Network." Electronics ETF 26, no. 2 (2022): 53–64. http://dx.doi.org/10.53314/els2226053k.

Pełny tekst źródła
Streszczenie:
Wireless sensor network (WSN) is an emerging topic in wireless communication where various sensor nodes are connected over the internet for data exchange. Exchanging the information over the WSN is very critical; therefore, it requires authentication and security mechanisms to ensure integrity and confidentiality. To avoid unauthorized use of WSN, the authentication through a digital signature turns into an essential task in WSN. Verification of individual signature is taking too much time and it is not suitable for wireless sensor network. Digital signature verification time can be reduced by
Style APA, Harvard, Vancouver, ISO itp.
12

Nuraeni, Fitri, Dede Kurniadi, and Diva Nuratnika Rahayu. "IMPLEMENTATION OF RSA AND AES-128 SUPER ENCRYPTION ON QR-CODE BASED DIGITAL SIGNATURE SCHEMES FOR DOCUMENT LEGALIZATION." Jurnal Teknik Informatika (Jutif) 5, no. 3 (2024): 675–84. https://doi.org/10.52436/1.jutif.2024.5.3.1426.

Pełny tekst źródła
Streszczenie:
Maintaining the confidentiality and integrity of electronic documents is essential in the modern digital age. In the contemporary digital world, digital signatures are essential for safeguarding and legalizing electronic documents. The current issue, however, goes beyond digital signatures and instead centers on enhancing security and data integrity. Therefore, RSA and AES-128 super-encryption is required in QR-code-based digital signature techniques for document legalization. This research stage entails constructing a super encryption algorithm, testing it experimentally for security and perf
Style APA, Harvard, Vancouver, ISO itp.
13

Susilawati Mohamad, Fatma, Fadi Mohammad Alsuhimat, Mohamad Afendee Mohamed, Mumtazimah Mohamad, and Azrul Amri Jamal. "Detection and Feature Extraction for Images Signatures." International Journal of Engineering & Technology 7, no. 3.28 (2018): 44. http://dx.doi.org/10.14419/ijet.v7i3.28.20963.

Pełny tekst źródła
Streszczenie:
The signing process is one of the most important processes used by organizations to ensure the confidentiality of information and to protect it against any unauthorized penetration or access to such information. As organizations and individuals enter the digital world, there is an urgent need for a digital system capable of distinguishing between the original and fraud signature, in order to ensure individuals authorization and determine the powers allowed to them. In this paper, three widely used feature detection algorithms, HARRIS, BRISK (Binary Robust Invariant Scalable Keypoints) and FAST
Style APA, Harvard, Vancouver, ISO itp.
14

Yusuf, Hasril, Afriyudi Afriyudi, and Hadi Syaputra. "Digital Signature Pada Citra Digital Menggunakan Algoritma Rc6 Studi Kasus: Dokumen Kartu Keluarga." Journal of Computer and Information Systems Ampera 1, no. 1 (2020): 44–52. http://dx.doi.org/10.51519/journalcisa.v1i1.4.

Pełny tekst źródła
Streszczenie:
The confidentiality of a document is an important requirement for the people of this age to protect their privacy from people who have no right to know it. To overcome this, an application that can encrypt document files in the form of digital images is needed so that it is not known by others. . The algorithm that has been developed in this study we use the RC6 algorithm as an algorithm method. The purpose of this system will be to help specifically in the administration section to enter or store documents, find and create reports that will be seen by government installations in an encrypted
Style APA, Harvard, Vancouver, ISO itp.
15

David, Shibin, and G. Jaspher W. Kathrine. "Digital Signature Algorithm for M-Payment Applications Using Arithmetic Encoding and Factorization Algorithm." Journal of Cases on Information Technology 23, no. 3 (2021): 11–26. http://dx.doi.org/10.4018/jcit.20210701.oa2.

Pełny tekst źródła
Streszczenie:
Mobile communication systems employ an encoding-encryption model to ensure secure data transmission over the network. This model encodes the data and encrypts it before transmitting it to the receiver's end. A non-trivial operation is performed to generate a strong secret key through which the data is encrypted. To support the security level of this model, arithmetic encoding is performed upon the data before encryption. The encrypted data is hashed using a lightweight hashing algorithm to generate a small and fixed length hash digest to overcome the overheads before it is communicated to the
Style APA, Harvard, Vancouver, ISO itp.
16

Lin, Baode, Zhenwei Geng, and Fengrong Yu. "Information Security Protection of Internet of Energy Using Ensemble Public Key Algorithm under Big Data." Journal of Electrical and Computer Engineering 2023 (February 17, 2023): 1–10. http://dx.doi.org/10.1155/2023/6853902.

Pełny tekst źródła
Streszczenie:
This work aims to solve the specific problem in the Power Internet of Things (PIoT). PIoT is vulnerable to monitoring, tampering, forgery, and other attacks during frequent data interaction under the background of big data, leading to a severe threat to the power grid’s Information Security (ISEC). Cryptosystems can solve ISEC problems, such as confidentiality, data integrity, authentication, identity recognition, data control, and nonrepudiation. Thereupon, this work expounds on cryptography from public-key encryption and digital signature and puts forward the model of network information att
Style APA, Harvard, Vancouver, ISO itp.
17

Hendry Leo Kanickam, S., and L. Jayasimman. "Comparative Analysis of Hash Authentication Algorithms and ECC Based Security Algorithms in Cloud Data." Asian Journal of Computer Science and Technology 8, no. 1 (2019): 53–61. http://dx.doi.org/10.51983/ajcst-2019.8.1.2118.

Pełny tekst źródła
Streszczenie:
Cloud computing is ensuring the security of stored data in cloud computing servers is one of the mainly demanding issues. In Cloud numerous security issues arises such as authentication, integrity and confidentiality. Different encryption techniques attempt to overcome these data security issues to an enormous extent. Hashing algorithm plays an important role in data integrity, message authentication, and digital signature in modern information security. For security purpose using encryption algorithm like ECC (Elliptic Curve Cryptography) and Authentication of data integrity using hashing alg
Style APA, Harvard, Vancouver, ISO itp.
18

Penubadi, Harshavardhan Reddy, Pritesh Shah, Ravi Sekhar, et al. "Sustainable electronic document security: a comprehensive framework integrating encryption, digital signature and watermarking algorithms." Heritage and Sustainable Development 5, no. 2 (2023): 391–404. http://dx.doi.org/10.37868/hsd.v5i2.359.

Pełny tekst źródła
Streszczenie:

 
 
 
 Protecting electronic documents, especially those containing sensitive data, is a major challenge in an open web. The data security industry has long struggled to manage the security of e-books, data shows that information security issues can cause significant economic losses after three years Although cryptographic methods have been proposed as a solution in of these challenges Focusing on speed and efficiency The shortcomings of traditional encryption methods have been thoroughly examined Although a number of network management techniques assure retention privacy
Style APA, Harvard, Vancouver, ISO itp.
19

Chen, Zao. "Federated Learning based on Homomorphic Encryption and Digital Signatures." Highlights in Science, Engineering and Technology 39 (April 1, 2023): 595–603. http://dx.doi.org/10.54097/hset.v39i.6596.

Pełny tekst źródła
Streszczenie:
Federated learning aims to train a centralized federated model using decentralized data sources and to ensure the security and privacy of user data during system training process. Federal learning still faces four challenges: high communication costs, system heterogeneity, data heterogeneity, and data security, The primary attacks facing federal learning include confidentiality, integrity, and usability attacks. Attackers mainly target confidential attacks, while malicious attackers target integrity attacks and usability attacks. Homomorphism encryption refers to the encryption algorithm that
Style APA, Harvard, Vancouver, ISO itp.
20

Devendra, Dandekar Pranjali Dandekar Rohanak Pawar Nikhil Kamble Sandip Patil. "Document Verification System in Blockchain Technique by using Hash & Digital Signature Algorithm." International Journal of Advanced Innovative Technology in Engineering 10, no. 2 (2025): 145–52. https://doi.org/10.5281/zenodo.15423140.

Pełny tekst źródła
Streszczenie:
The use of blockchain technology is a game changer in improving the security and transparency of verifying documents and likewise in enhancing efficiency for such processes. The paper proposes a document-verification system using technology on the Polygon Blockchain: an environment-friendly Layer 2 solution on the Ethereum platform. The system is aimed at addressing issues such as document tampering, forgery, and inefficiencies in traditional verification methods by offering them in a secure and transparent environment. The validation process for several documents, such as academic certificate
Style APA, Harvard, Vancouver, ISO itp.
21

Mark Espalmado, John, and Edwin Arboleda. "DARE Algorithm: A New Security Protocol by Integration of Different Cryptographic Techniques." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 2 (2017): 1032. http://dx.doi.org/10.11591/ijece.v7i2.pp1032-1041.

Pełny tekst źródła
Streszczenie:
Exchange of information between computer networks requires a secure communications channel to prevent and monitor unauthorized access, modification and denial of the computer network. To address this growing problem, security experts sought ways to advance the integrity of data transmission. Security Attacks compromises the security and hence hybrid cryptographic algorithms have been proposed to achieve safe service in the proper manner, such as user authentication and data confidentiality. Data security and authenticity are achieved using these algorithms. Moreover, to improve the strength an
Style APA, Harvard, Vancouver, ISO itp.
22

Jean Pierre Ntayagabiri, Jeremie Ndikumagenge, Youssef Bentaleb, and Hind El Makhtoum. "Comparative Analysis of Elliptic Curve-Based Cryptographic Approaches for Internet of Things Security." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 6 (2024): 1077–92. https://doi.org/10.32628/cseit2410457.

Pełny tekst źródła
Streszczenie:
The rapid expansion of the Internet of Things (IoT) introduces significant security challenges, given the resource-constrained nature of most IoT devices. To address these challenges, elliptic curve cryptography (ECC) has emerged as a promising solution due to its ability to deliver high levels of security with shorter key lengths, making it highly efficient for devices with limited computational power and memory. This paper focuses on a comparative analysis of three widely used ECC-based cryptographic algorithms: Elliptic Curve Digital Signature Algorithm (ECDSA), Elliptic Curve Integrated En
Style APA, Harvard, Vancouver, ISO itp.
23

John, Mark B. Espalmado, and R. Arboleda Edwin. "DARE Algorithm: A New Security Protocol by Integration of Different Cryptographic Techniques." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 2 (2017): 1032–41. https://doi.org/10.11591/ijece.v7i2.pp1032-1041.

Pełny tekst źródła
Streszczenie:
Exchange of information between computer networks requires a secure communications channel to prevent and monitor unauthorized access, modification and denial of the computer network. To address this growing problem, security experts sought ways to advance the integrity of data transmission. Security Attacks compromises the security and hence hybrid cryptographic algorithms have been proposed to achieve safe service in the proper manner, such as user authentication and data confidentiality. Data security and authenticity are achieved using these algorithms. Moreover, to improve the strength an
Style APA, Harvard, Vancouver, ISO itp.
24

ЛАВРИК, ІВАН. "ДОСЛІДЖЕННЯ АЛГОРИТМІВ ПОСТКВАНТОВОГО ЦИФРОВОГО ПІДПИСУ". Herald of Khmelnytskyi National University. Technical sciences 333, № 2 (2024): 361–69. http://dx.doi.org/10.31891/2307-5732-2024-333-2-56.

Pełny tekst źródła
Streszczenie:
The continuous development of quantum computing requires the development of cryptographic algorithms resistant to quantum cryptanalysis. Therefore, the National Institute of Standards and Technology (NIST) is holding a competition to standardize algorithms in the post-quantum period, including Crystals-Dilithium, Falcon, and Sphincs+ for digital signatures. In order to determine the ways of development and ways to improve the existing methods of cryptographic protection and electronic digital signature (EDS), an urgent task arose to assess the effectiveness (stability and computational complex
Style APA, Harvard, Vancouver, ISO itp.
25

Dr.Yakubu, Ajiji Maker. "The Importance of Cryptography in Digital Signatures." International Journal of Information Technology 3, no. 8 (2020): 1–12. https://doi.org/10.5281/zenodo.3685178.

Pełny tekst źródła
Streszczenie:
Information is an organization’s most valuable asset. As we have seen in previous security and risk management is data-centric. The efforts to protect systems and networks attempt to achieve, data availability, confidentiality. Integrity, and the IP address of the devices that signed, we also saw no infrastructure security controls are not 100% effective. In reaction layered security model, it often necessary to underlying implement one final prevention control wrapped around sensitive information, Encryption is not a security panacea not solve all your data-centric security issues. This
Style APA, Harvard, Vancouver, ISO itp.
26

Rushda, Naushad Dakhni, and I. Sandilkar Saniya. "Implementation of RSA Algorithm for Encryption and Decryption Recent Technology Trends in Computer Technology." International Journal of Advanced Research in Science, Communication and Technology (IJARSCT) 3, no. 19 (2023): 66–70. https://doi.org/10.5281/zenodo.8133459.

Pełny tekst źródła
Streszczenie:
Cryptographic technique is one of the principal means to protect information security. Not only has it to ensure the information confidential, but also provides digital signature, authentication, secret substorage, system security and other functions. Therefore, the encryption and decryption solution can ensure the confidentiality of the information, as well as the integrity of information and certainty, to prevent information from tampering, forgery and counterfeiting. Encryption and decryption algorithm's security depends on the algorithm while the internal structure of the rigor of math
Style APA, Harvard, Vancouver, ISO itp.
27

Sadikin, Mohamad Ali, and Rini Wisnu Wardhani. "Implementation of RSA 2048-bit and AES 256-bit with Digital Signature for Secure Electronic Health Record Application." CommIT (Communication and Information Technology) Journal 10, no. 2 (2016): 63. http://dx.doi.org/10.21512/commit.v10i2.1549.

Pełny tekst źródła
Streszczenie:
This research addresses the implementation of encryption and digital signature technique for electronic health record to prevent cybercrime such as robbery, modification and unauthorised access. In this research, RSA 2048-bit algorithm, AES 256-bit and SHA 256 will be implemented in Java programming language. Secure Electronic Health Record Information (SEHR) application design is intended to combine given services, such as confidentiality, integrity, authentication, and nonrepudiation. Cryptography is used to ensure the file records and electronic documents for detailed information on the med
Style APA, Harvard, Vancouver, ISO itp.
28

Patil, Girish, Kartik Nillawar, Mohit Khatri, Sachin Shetkar, and Snehal Shinde. "Smart Way for Prescribing Medication." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (2023): 6795–800. http://dx.doi.org/10.22214/ijraset.2023.53317.

Pełny tekst źródła
Streszczenie:
Abstract: This research addresses the implementation of digital signature technique for electronic prescription to prevent cybercrime problem such as robbery, modification and unauthorized access. In this research, RSA 2048-bit algorithm will be implemented in Java programming and android based system. Secure Electronic Prescription (SEP) application design is intended to combine given services, such as confidentiality, authentication, and non-repudiation. Cryptography is used to ensure the prescription file and QR-Code for detailed information on the prescription that have been given only for
Style APA, Harvard, Vancouver, ISO itp.
29

Gour, Ayush, Simarjit Singh Malhi, Gursharan Singh, and Gursimran Kaur. "Hybrid Cryptographic Approach: For Secure Data Communication using Block Cipher Techniques." E3S Web of Conferences 556 (2024): 01048. http://dx.doi.org/10.1051/e3sconf/202455601048.

Pełny tekst źródła
Streszczenie:
In our rapidly evolving digital age, where data is the lifeblood of businesses and individuals alike, safeguarding sensitive information and ensuring secure communication channels has become paramount. This research paper introduces a novel hybrid cryptographic algorithm designed to address the multifaceted challenges of data security and secure communication. The proposed algorithm leverages the beneficial features of symmetric and asymmetric encryption approaches, developing a way for robust and adaptable security solutions. This hybrid algorithm begins by utilizing a state-of-the-art symmet
Style APA, Harvard, Vancouver, ISO itp.
30

Sharma, Arvind K., and Sudesh K. Mittal. "Cryptographic Keyed Hash Function: PARAŚU-256." Journal of Computational and Theoretical Nanoscience 17, no. 11 (2020): 5072–84. http://dx.doi.org/10.1166/jctn.2020.9343.

Pełny tekst źródła
Streszczenie:
Cryptography has distinct paramount significance in interconnected environment where whether we concern about ‘Computer-Security,’ ‘Information-Security,’ ‘Network-Security’ etc., doesn’t matters and, ingredients of this particular branch of computer science viz. ‘Encryption/Decryption’ systems, ‘Hash-Functions,’ ‘Digital-Signatures’ etc. also playing vital role from years in order to manage ‘Confidentiality,’ ‘Integrity’ and ‘Authenticity’ of resources. The Encryption/Decryption Cryptosystems managing the Confidentiality and Hash-Functions are fully devoted towards to look after the Integrity
Style APA, Harvard, Vancouver, ISO itp.
31

Bourair, Bourair, Noora zidan .., Bourair Al Al-Attar, Hussein A. Hussein Al Naffakh, and J. F. F.Tawfeq. "Implementation of novel cryptographic technique for enhancing the cipher security for Resilient Infrastructure." Fusion: Practice and Applications 15, no. 1 (2024): 32–44. http://dx.doi.org/10.54216/fpa.150103.

Pełny tekst źródła
Streszczenie:
Cryptography is a well-known technology for providing confidential data transfer via asymmetric or symmetric algorithms with public or private keys. Secure data transmission over networks using unreliable, untrusted channels is made achievable by cryptography. As a result of the quick digital transition, network traffic is rapidly rising, and consumers remain constantly connected and accessible online. Extortions, including transforming, spoofing, and tracking data through unauthorised access, are quite widespread over the internet. Many more cryptographic algorithms already exist, but they ne
Style APA, Harvard, Vancouver, ISO itp.
32

Houari, Nawal Sad, Fatima Kabli, and Affaf Matoug. "Integration of IMEI, RSA, and Signature to Secure Communication in Mobile Applications." International Journal of Organizational and Collective Intelligence 12, no. 1 (2022): 1–18. http://dx.doi.org/10.4018/ijoci.306979.

Pełny tekst źródła
Streszczenie:
The mobile instant messaging applications have become a famous wireless service in the world allowing a user to communicate with anyone in anywhere. Consequently, the manipulation of the user data creates a pressing need for securing the information and the associated technologies. The protection of these communications has become a paramount objective. The concept of cryptography has become a basic concept in communication and the exchange of messages within companies. This paper presents a hybrid security system allowing messages to be exchanged within a company in a secure manner. Our goal
Style APA, Harvard, Vancouver, ISO itp.
33

Khalid, Zhwan Mohammed, and Shavan Askar. "Resistant Blockchain Cryptography to Quantum Computing Attacks." International Journal of Science and Business 5, no. 3 (2021): 116–25. https://doi.org/10.5281/zenodo.4497732.

Pełny tekst źródła
Streszczenie:
Due to the need to maintain confidentiality, redundancy, and openness, the usage of Blockchain and other DLTs has dramatically advanced in recent years, and is being recommended for various applications. In blockchain, these capabilities are supplied by means of hash functions and public-key encryption. However, the rapid development of quantum computation in the near future has opened the door to the Grover and Shor algorithms. These algorithms challenge both public and hash encryption, causing blockchains to redesign and use quantum attack-tolerant cryptosystems; this produces cryptosystems
Style APA, Harvard, Vancouver, ISO itp.
34

Harsh Verma. "Hybrid Data Integrity Verification for Real-Time IoT Systems Using AEAD and VRF with ECDSA." Journal of Information Systems Engineering and Management 10, no. 34s (2025): 855–67. https://doi.org/10.52783/jisem.v10i34s.5875.

Pełny tekst źródła
Streszczenie:
With the rapid growth of the Internet of Things (IoT), maintaining data integrity, confidentiality, and authentication is now an imperative challenge. Most conventional cryptographic solutions cannot satisfy the specific constraints of IoT environments, which include limited computational resources, energy efficiency, and scalability. This study proposes a lightweight hybrid cryptographic framework combining Authenticated Encryption with Associated Data (AEAD) and Verifiable Random Functions (VRF) with Elliptic Curve Digital Signature Algorithm (ECDSA). The hybrid framework is intended to offe
Style APA, Harvard, Vancouver, ISO itp.
35

Satrasupalli, Sivaji, and S. Vishnu. "An Encryption Algorithm for Enhanced Image Security." International Journal of Engineering and Advanced Technology 9, no. 1s5 (2019): 81–84. http://dx.doi.org/10.35940/ijeat.a1020.1291s519.

Pełny tekst źródła
Streszczenie:
Image security finds its applications in many areas such as bio-metric, digital signatures, watermarking, confidentiality of medical and data in transit. It has become necessary to secure the images in order to protect the confidential data. Cryptography is one of the methodologies through which image data can be secured for storing or transmission purposes by encrypting the same and decrypt it when needed. The main challenge in image encryption is generating cipher which takes less computational without compromising the security. In this paper, we present a symmetric encryption algorithm whic
Style APA, Harvard, Vancouver, ISO itp.
36

Tsai, Chwei-Shyong, Hsin-Liang Chen, Hsien-Chu Wu, and Josh Jia-Ching Ying. "A Puzzle-Based Data Sharing Approach with Cheating Prevention Using QR Code." Symmetry 13, no. 10 (2021): 1896. http://dx.doi.org/10.3390/sym13101896.

Pełny tekst źródła
Streszczenie:
The information technique has developed rapidly. The technique of QR codes is widely applied in our daily life, and the mechanism is suitable to share data. A QR code uses symmetric encryption to store and retrieve data efficiently. However, the security issues of QR codes are seldom discussed by the wider community. Moreover, if the sender wishes only the authorized participant to attain the private data which are shared, the data must be encrypted. Furthermore, we do not know who should be censured when problems arise. In view of this, to maintain the integrity and the confidentiality of inf
Style APA, Harvard, Vancouver, ISO itp.
37

J., Williams,, Bennett, E. O., and Anireh, V.I.E. "An efficient algorithm for text encryption on android devices." International Journal of Engineering and Computer Science 13, no. 07 (2024): 26229–35. http://dx.doi.org/10.18535/ijecs/v13i07.4843.

Pełny tekst źródła
Streszczenie:
In the era of digital communication, ensuring the confidentiality and integrity of sensitive information is paramount. This dissertation introduces a robust text encryption system that combines the strengths of Advanced Encryption Standard (AES) and Rivest-Shamir-Adleman (RSA) algorithms to create a hybrid encryption approach. Object Oriented Design (OOD) was used for the design methodology. The proposed system leverages the efficiency of AES for symmetric key encryption and the security benefits of RSA for key exchange and digital signatures. The encryption process begins with the generation
Style APA, Harvard, Vancouver, ISO itp.
38

Esh Narayan. "Cryptography Security of Digital Signals using Golden Matrix with Recurrence Relations." Journal of Information Systems Engineering and Management 10, no. 14s (2025): 845–56. https://doi.org/10.52783/jisem.v10i14s.2400.

Pełny tekst źródła
Streszczenie:
Modern cryptography is a field of study and practice that involves creating secure communication and data protection systems. Its primary goal is to ensure authenticity, integrity, and confidentiality of information in the presence of adversaries or potential attackers. Digital signatures are a crucial component of modern cryptography, providing validation, data privacy protection in digital communication. These are used to verify the authenticity of a digital message or document and ensure that no changes have been made to it since the signature was applied. . We can explore new methods for s
Style APA, Harvard, Vancouver, ISO itp.
39

Akanksha, Tomar* Jamwant Kumbhre. "SURVEY ON CLOUD SECURITY BY DATA ENCRYPTION USING ELLIPTIC CURVE CRYPTOGRAPHY." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 5, no. 12 (2016): 992–97. https://doi.org/10.5281/zenodo.225383.

Pełny tekst źródła
Streszczenie:
Cloud computing is one of the latest technology trend of the IT trade for business area. Cloud computing security converged into a demanding topic in the sector of information technology and computer science research programs. Cloud Computing is a conceptual service based technology which is used by many companies widely these days. Elliptical Curve Cryptography based algorithm provides a highly secure communication, data integrity and authentication, along with the non-repudiation communication and data confidentiality. Elliptical Curve Cryptography is known as a public key encryption techniq
Style APA, Harvard, Vancouver, ISO itp.
40

VENKATESWARAN, N. "A SECURE BLOCKCHAIN FRAMEWORK FOR COLLABORATIVE SERVICE." International Scientific Journal of Engineering and Management 04, no. 06 (2025): 1–9. https://doi.org/10.55041/isjem04609.

Pełny tekst źródła
Streszczenie:
Abstract: With the rapid development of cloud computing, a large number of web services have been emerging quickly, which brings a heavy burden for users to choose the services they preferred. In order to suggest web services for users, recommendation algorithms are needed and many of them have been investigated recently. However, most of the existing recommendation schemes are based on centralized historical data, which may lead to single point of failure. Generally, the data contains a lot of sensitive information that cloud may expose the privacy of users, which makes most cloud platforms r
Style APA, Harvard, Vancouver, ISO itp.
41

AlShalaan, Manal Rajeh, and Suliman Mohamed Fati. "Enhancing Organizational Data Security on Employee-Connected Devices Using BYOD Policy." Information 14, no. 5 (2023): 275. http://dx.doi.org/10.3390/info14050275.

Pełny tekst źródła
Streszczenie:
To address a business need, most organizations allow employees to use their own devices to enhance productivity and job satisfaction. For this purpose, the Bring Your Own Device (BYOD) policy provides controllable access for employees to organize data through their personal devices. Although the BYOD practice implies plenty of advantages, this also opens the door to a variety of security risks. This study investigates these security risks and proposes a complementary encryption approach with a digital signature that uses symmetric and asymmetric algorithms, depending on the organization’s digi
Style APA, Harvard, Vancouver, ISO itp.
42

Shaaban, Mohamed Ali, Almohammady S. Alsharkawy, Mohammad T. AbouKreisha, and Mohammed Abdel Razek. "Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment." International journal of Computer Networks & Communications 15, no. 04 (2023): 55–71. http://dx.doi.org/10.5121/ijcnc.2023.15404.

Pełny tekst źródła
Streszczenie:
The rapid growth of cloud computing and Internet of Things (IoT) applications faces several threats, such as latency, security, network failure, and performance. These issues are solved with the development of fog computing, which brings storage and computation closer to IoT-devices. However, there are several challenges faced by security designers, engineers, and researchers to secure this environment. To ensure the confidentiality of data that passes between the connected devices, digital signature protocols have been applied to the authentication of identities and messages. However, in the
Style APA, Harvard, Vancouver, ISO itp.
43

VS, Barath. "Secured Folder Encryption and Decryption." International Journal for Research in Applied Science and Engineering Technology 12, no. 11 (2024): 121–29. http://dx.doi.org/10.22214/ijraset.2024.64953.

Pełny tekst źródła
Streszczenie:
In today's digital world, when sensitive data is routinely targeted by thieves, strong encryption technologies are critical for preventing breaches and ransomware attacks. Our research solves this need by creating a Secure Folder Encryption System that employs AES-GCM (Advanced Encryption Standard - Galois/Counter Mode) and HMAC (Hash-based Message Authentication Code) to secure data confidentiality and integrity when stored on cloud servers. Drawing on research on ECG image file encryption using ECDH and AES-GCM, we choose AES-GCM for its high resistance to manipulation and unauthorized acces
Style APA, Harvard, Vancouver, ISO itp.
44

Prasad, V. Hari, Mohammed Rafi, Mohammad Khaleel Ahmed, Ashraf Ben Miled, and Mahammad Shabana. "Random Self-Generative Schnorr Certificate less Signcryption for Secure Data Sharing in Mobile Cloud Environments." WSEAS TRANSACTIONS ON COMPUTER RESEARCH 13 (April 10, 2025): 270–80. https://doi.org/10.37394/232018.2025.13.25.

Pełny tekst źródła
Streszczenie:
To deliver applications and services required by mobile devices, mobile cloud computing adopts cloud computing. Cloud computing assists data sharing among authorized users through data stored on cloud servers. Data sharing implies distributing data resources to multiple users or applications with the utmost security. But maintaining security while transferring data in cloud computing is an important challenge. In conventional algorithms, data sharing in a secure environment and control policies in accessing the data for authorized users are the biggest concerns to deal with. To handle these se
Style APA, Harvard, Vancouver, ISO itp.
45

Kim, Dohoon, Sang Seo, Heesang Kim, Won Gi Lim, and Youn Kyu Lee. "A Study on the Concept of Using Efficient Lightweight Hash Chain to Improve Authentication in VMF Military Standard." Applied Sciences 10, no. 24 (2020): 8999. http://dx.doi.org/10.3390/app10248999.

Pełny tekst źródła
Streszczenie:
Authentication algorithms in the form of cryptographic schemes, such as the Secure Hash Algorithm 1 (SHA-1) and the digital signature algorithm (DSA), specified in the current variable message format (VMF) military standard have numerous reliability-related limitations when applied to tactical data link (TDL) and multi-TDL networks (MTN). This is because TDL and MTN require maximum tactical security, communication integrity, and low network overhead based on many protocol header bits for rapid communication with limited network resources. The application of such authentication algorithms to TD
Style APA, Harvard, Vancouver, ISO itp.
46

Hafeez, Muhammad Asfand, Kazi Hassan Shakib, and Arslan Munir. "A Secure and Scalable Authentication and Communication Protocol for Smart Grids." Journal of Cybersecurity and Privacy 5, no. 2 (2025): 11. https://doi.org/10.3390/jcp5020011.

Pełny tekst źródła
Streszczenie:
The growing adoption of smart grid systems presents significant advancements in the efficiency of energy distribution, along with enhanced monitoring and control capabilities. However, the interconnected and distributed nature of these systems also introduces critical security vulnerabilities that must be addressed. This study proposes a secure communication protocol specifically designed for smart grid environments, focusing on authentication, secret key establishment, symmetric encryption, and hash-based message authentication to provide confidentiality and integrity for communication in sma
Style APA, Harvard, Vancouver, ISO itp.
47

Nurcahya, Saputra Dwi, Dian Nazelliana, and Purwanti . "Implementasi Algoritma Kriptografi Chiper Simetris Menggunakan Bahasa Pemrograman PHP." Jurnal Nasional Komputasi dan Teknologi Informasi (JNKTI) 8, no. 2 (2025): 1084–89. https://doi.org/10.32672/jnkti.v8i2.8989.

Pełny tekst źródła
Streszczenie:
Abstrak - Dalam dunia sekarang ini, kemajuan teknologi di bidang komputer dan telekomunikasi berkembang sangat pesat. Lalu lintas pengiriman data dan informasi yang semakin global, serta konsep open system dari suatu jaringan memudahkan seseorang untuk masuk ke dalam jaringan tersebut. Hal tersebut dapat membuat proses pengiriman data menjadi tidak aman dan dapat saja dimanfaatkan oleh pihak lain yang tidak bertanggung jawab, yang mengambil informasi atau data yang dikirimkan tersebut di tengah perjalanan. Maka dibutuhkan suatu sistem keamanan yang dapat menjaga kerahasiaan suatu data, sehingg
Style APA, Harvard, Vancouver, ISO itp.
48

Benmenzer, Faiza, and Rachid Beghdad. "Combining Elliptic Curve Cryptography and Blockchain Technology to Secure Data Storage in Cloud Environments." International Journal of Information Security and Privacy 16, no. 1 (2022): 1–20. http://dx.doi.org/10.4018/ijisp.307072.

Pełny tekst źródła
Streszczenie:
Many encryption strategies have been applied to ensure data confidentiality and improve cloud security. The most recent cryptosystems are based on homomorphic (HE), attribute-based (ABE), and hybrid encryption. However, most of them suffer from numerous drawbacks: high time consumption, encrypted message size, and some vulnerabilities. Hence, a secure method is highly required to get a satisfying security level while keeping the computational complexity reduced. This paper outlines a novel technique that combines elliptic curve cryptography (ECC) and Blockchain technology. The data is first en
Style APA, Harvard, Vancouver, ISO itp.
49

Chen, Jiaoyue, Qihui Zuo, Wenquan Jin, Yujing Wu, Yihu Xu, and Yinan Xu. "Study of Network Security Based on Key Management System for In-Vehicle Ethernet." Electronics 13, no. 13 (2024): 2524. http://dx.doi.org/10.3390/electronics13132524.

Pełny tekst źródła
Streszczenie:
With the rapid development of vehicle electronic communication technology, in-vehicle bus network system communicates with external electronic devices such as mobile phones and OBD II, causing in-vehicle bus networks to face severe network security threats. This study aims to explore the security scheme of in-vehicle bus networks based on a key management system to ensure the confidentiality, integrity, authenticity, and availability of vehicle communication, and innovatively propose a key management system. This key management system uses data encryption and signature algorithms based on the
Style APA, Harvard, Vancouver, ISO itp.
50

Ambareen, Javeria, M. Prabhakar, and Tabassum Ara. "LEES: a Hybrid Lightweight Elliptic ElGamal-Schnorr-Based Cryptography for Secure D2D Communications." Journal of Telecommunications and Information Technology 2 (March 30, 2021): 24–30. http://dx.doi.org/10.26636/jtit.2021.146020.

Pełny tekst źródła
Streszczenie:
Device-to-device (D2D) communications in 5G networks will provide greater coverage, as devices will be acting as users or relays without any intermediate nodes. However, this arrangement poses specific security issues, such as rogue relays, and is susceptible to various types of attacks (impersonation, eavesdropping, denial-of-service), due to the fact that communication occurs directly. It is also recommended to send fewer control messages, due to authenticity- and secrecy related prevailing requirements in such scenarios. Issues related to IoT applications need to be taken into consideration
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!