Journal articles on the topic 'Confidentialité Blowfish'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 35 journal articles for your research on the topic 'Confidentialité Blowfish.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Et. al., Pravin Soni,. "Performance Analysis of Cascaded Hybrid Symmetric Encryption Models." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (April 10, 2021): 1699–708. http://dx.doi.org/10.17762/turcomat.v12i2.1506.
Full textEzadeen, Shamil, and Auday H. Alwattar. "Survey of Blowfish Algorithm for Cloud." Technium: Romanian Journal of Applied Sciences and Technology 4, no. 6 (June 28, 2022): 18–28. http://dx.doi.org/10.47577/technium.v4i6.6791.
Full textRiza, Ferdy, Nurmala Sridewi, Amir Mahmud Husein, and Muhammad Khoiruddin Harahap. "Analisa Frekuensi Hasil Enkripsi Pada Algoritma Kriptografi Blowfish Terhadap Keamanan Informasi." Jurnal Teknologi dan Ilmu Komputer Prima (JUTIKOMP) 1, no. 1 (April 1, 2018): 11–15. http://dx.doi.org/10.34012/jutikomp.v1i1.233.
Full textHaryono, Wasis. "Comparison Encryption of How to Work Caesar Cipher, Hill Cipher, Blowfish and Twofish." Data Science: Journal of Computing and Applied Informatics 4, no. 2 (July 31, 2020): 100–110. http://dx.doi.org/10.32734/jocai.v4.i2-4004.
Full textSimanullang, Harlen Gilbert, and Arina Prima Silalahi. "ALGORITMA BLOWFISH UNTUK MENINGKATKAN KEAMANAN DATABASE MYSQL." METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi 4, no. 1 (March 10, 2018): 10–14. http://dx.doi.org/10.46880/mtk.v4i1.58.
Full textRen, Xun Yi, Jun Feng Zhang, Yang Yu, and Hai Ping Wan. "Hybrid Encryption Scheme of EOC Traffic." Advanced Engineering Forum 6-7 (September 2012): 907–12. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.907.
Full textQuilala, Rogel Ladia, and Theda Flare Ginoy Quilala. "Document verification using quick response code with modified secure hash algorithm-1 and modified blowfish algorithm." Indonesian Journal of Electrical Engineering and Computer Science 28, no. 1 (October 1, 2022): 470. http://dx.doi.org/10.11591/ijeecs.v28.i1.pp470-479.
Full textEt. al., Dr M. Buvana,. "Optimize Cryptography Algorithm for Efficient Data Security on Cloud Computing." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 1S (April 11, 2021): 459–64. http://dx.doi.org/10.17762/turcomat.v12i1s.1905.
Full textRifa’i, Annas, and Lilis Cucu Sumartini. "IMPLEMENTASI KRIPTOGRAFI MENGGUNAKAN METODE BLOWFISH DAN BASE64 UNTUK MENGAMANKAN DATABASE INFORMASI AKADEMIK PADA KAMPUS AKADEMI TELEKOMUNIKASI BOGOR BERBASIS WEB-BASED." Jurnal E-Komtek (Elektro-Komputer-Teknik) 3, no. 2 (November 12, 2019): 87–96. http://dx.doi.org/10.37339/e-komtek.v3i2.133.
Full textRaut, Kinjal. "A Comprehensive Review of Cryptographic Algorithms." International Journal for Research in Applied Science and Engineering Technology 9, no. 12 (December 31, 2021): 1750–56. http://dx.doi.org/10.22214/ijraset.2021.39581.
Full textSharma, Arvind K., and S. K. Mittal. "Cryptographic Merkle-Damgard Hash Construction: MD5 Vulnerabilities." Journal of Computational and Theoretical Nanoscience 17, no. 6 (June 1, 2020): 2435–40. http://dx.doi.org/10.1166/jctn.2020.8913.
Full textAlshannaq, Osama, Mohd Rizuan Baharon, Jamil Abedalrahim Jamil Alsayaydeh, Montaser B. A. Hammouda, Khalid Hammouda, Mohammad Mahmoud Nawafleh, and A. I. A. Rahman. "Analysis of the Lowest Memory Consumption (Memory Usage) Through Running Different Cryptography Techniques for Different Types of Images." Journal of Physics: Conference Series 2319, no. 1 (August 1, 2022): 012027. http://dx.doi.org/10.1088/1742-6596/2319/1/012027.
Full textIsiaka O.S., Murtala K., Ibraheem A.F., and Bolaji-Adetoro D.F. "HYBRIDIZATION OF RSA AND BLOWFISH CRYPTOGRAPHY ALGORITHMS FOR DATA SECURITY ON CLOUD STORAGE." International Journal of Engineering Technologies and Management Research 6, no. 12 (April 3, 2020): 29–34. http://dx.doi.org/10.29121/ijetmr.v6.i12.2019.471.
Full textSingh, Pankaj, and Sachin Kumar. "Study & analysis of cryptography algorithms : RSA, AES, DES, T-DES, blowfish." International Journal of Engineering & Technology 7, no. 1.5 (December 31, 2017): 221. http://dx.doi.org/10.14419/ijet.v7i1.5.9150.
Full textSolanki, Madan, and Prof (Dr ). Vrinda Tokekar. "Design and Implementation of Strong Security Architecture for Amazon Web Service based on Cloud Applications." International Journal of Innovative Technology and Exploring Engineering 11, no. 12 (November 30, 2022): 17–22. http://dx.doi.org/10.35940/ijitee.l9324.11111222.
Full textSaad, Mahaba, Khalid Youssef, Mohamed Tarek, and Hala Abdel-Kader. "Architecture of ASIP Crypto-Processor for Dynamic Runtime Security Applications." Indonesian Journal of Electrical Engineering and Computer Science 4, no. 2 (November 1, 2016): 412. http://dx.doi.org/10.11591/ijeecs.v4.i2.pp412-423.
Full textKumar, Pradeep, Kakoli Banerjee, Niraj Singhal, Ajay Kumar, Sita Rani, Raman Kumar, and Cioca Adriana Lavinia. "Verifiable, Secure Mobile Agent Migration in Healthcare Systems Using a Polynomial-Based Threshold Secret Sharing Scheme with a Blowfish Algorithm." Sensors 22, no. 22 (November 8, 2022): 8620. http://dx.doi.org/10.3390/s22228620.
Full textLalita Kumar Parvataneni, Mohith, Eswara Sai Nath Adusumalli, and Rajeshbabu C. "Secure and Efficient Query Processing Using Randomized Encryption and De-duplication on the Cloud." International Journal of Engineering & Technology 7, no. 2.24 (April 25, 2018): 311. http://dx.doi.org/10.14419/ijet.v7i2.24.12071.
Full textJabbar, Arshi, and Prof Umesh Lilhore. "Design and Implementation of Hybrid EC-RSA Security Algorithm Based on TPA for Cloud Storage." SMART MOVES JOURNAL IJOSCIENCE 3, no. 11 (November 30, 2017): 6. http://dx.doi.org/10.24113/ojsscience.v3i10.148.
Full textChandrasekaran, Jeyamala, and S. J. Thiruvengadam. "Ensemble of Chaotic and Naive Approaches for Performance Enhancement in Video Encryption." Scientific World Journal 2015 (2015): 1–11. http://dx.doi.org/10.1155/2015/458272.
Full textGoyal, Mani, and Avinash Sharma. "A Framework for Assessing Security Strength of Cloud Computing Service." Journal of Computational and Theoretical Nanoscience 16, no. 10 (October 1, 2019): 4389–93. http://dx.doi.org/10.1166/jctn.2019.8530.
Full textDener, Murat. "SDA-RDOS: A New Secure Data Aggregation Protocol for Wireless Sensor Networks in IoT Resistant to DOS Attacks." Electronics 11, no. 24 (December 15, 2022): 4194. http://dx.doi.org/10.3390/electronics11244194.
Full textAbdElminaam, DiaaSalama, Hatem M. Abdul Kader, Mohie M. Hadhoud, and Salah M. El-Sayed. "Developing and Evaluation of New Hybrid Encryption Algorithms." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 13, no. 1 (March 28, 2014): 4038–52. http://dx.doi.org/10.24297/ijct.v13i1.2926.
Full textAlabdulrazzaq, Haneen, and Mohammed N. Alenezi. "Performance Evaluation of Cryptographic Algorithms: DES, 3DES, Blowfish, Twofish, and Threefish." International Journal of Communication Networks and Information Security (IJCNIS) 14, no. 1 (April 15, 2022). http://dx.doi.org/10.17762/ijcnis.v14i1.5262.
Full textSeada Abdu Wakene, Sisay Muleta Hababa, Gutema Seboka Daba, and K S Ananda Kumar. "Data Storage Security in Mobile Cloud Computing (MCC) using Improved Blowfish Algorithm." International Journal of Scientific Research in Computer Science, Engineering and Information Technology, November 15, 2021, 100–111. http://dx.doi.org/10.32628/cseit217620.
Full text"Two Layer Image Encryption using Symmetric Key Algorithms." International Journal of Innovative Technology and Exploring Engineering 9, no. 7 (May 10, 2020): 1056–59. http://dx.doi.org/10.35940/ijitee.g5285.059720.
Full textAlwazzeh, Muneer, Sameer Karaman, and Mohammad Nur Shamma. "Man in The Middle Attacks Against SSL/TLS: Mitigation and Defeat." Journal of Cyber Security and Mobility, July 1, 2020. http://dx.doi.org/10.13052/jcsm2245-1439.933.
Full text"Security and Confidentiality of the Data using Block Level in Health Care System." International Journal of Recent Technology and Engineering 8, no. 2 (July 30, 2019): 2947–51. http://dx.doi.org/10.35940/ijrte.b2656.078219.
Full text"An Encryption Algorithm for Enhanced Image Security." International Journal of Engineering and Advanced Technology 9, no. 1S5 (December 30, 2019): 81–84. http://dx.doi.org/10.35940/ijeat.a1020.1291s52019.
Full text"Security Enhancement in Cryptography for Mobile Device Outsourced in Cloud Computing." International Journal of Innovative Technology and Exploring Engineering 9, no. 8 (June 10, 2020): 971–75. http://dx.doi.org/10.35940/ijitee.h6780.069820.
Full textKaviya, K., K. K. Shanthini, and M. Sujithra. "Evolving Cryptographic Approach for Enhancing Security of Resource Constrained Mobile Device Outsourced Data in Cloud Computing." International Journal of Scientific Research in Computer Science, Engineering and Information Technology, January 5, 2019, 101–6. http://dx.doi.org/10.32628/cseit195111.
Full textBarhoom, Tawfiq, and Mahmoud Abu Shawish. "Text File Privacy on the Cloud Based on Diagonal Fragmentation and Encryption." Journal of Engineering Research and Technology 8, no. 1 (March 3, 2021). http://dx.doi.org/10.33976/jert.8.1/2021/3.
Full text"Enhancing Image Security by employing Blowfish Algorithm further embedding text and Stitching the RGB components of a Host Image." International Journal of Recent Technology and Engineering 8, no. 2S11 (November 2, 2019): 3801–8. http://dx.doi.org/10.35940/ijrte.b1499.0982s1119.
Full textKhalaf, Ali Mahmood, and Kamaljit Lakhtaria. "A SURVEY ON SYMMETRIC-KEY AND ASYMMETRIC- KEY ALGORITHMS BASED CRYPTOGRAPHY." Towards Excellence, March 31, 2022, 361–77. http://dx.doi.org/10.37867/te140134.
Full textDas, Proteeti, Najmul Hoque Munshi, and Subhasis Maitra. "New Key-Dependent S-Box Generation Algorithm on AES." Micro and Nanosystems 13 (July 26, 2021). http://dx.doi.org/10.2174/1876402913666210726163822.
Full text