Статті в журналах з теми "Confidentialité Blowfish"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-35 статей у журналах для дослідження на тему "Confidentialité Blowfish".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Et. al., Pravin Soni,. "Performance Analysis of Cascaded Hybrid Symmetric Encryption Models." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (April 10, 2021): 1699–708. http://dx.doi.org/10.17762/turcomat.v12i2.1506.
Повний текст джерелаEzadeen, Shamil, and Auday H. Alwattar. "Survey of Blowfish Algorithm for Cloud." Technium: Romanian Journal of Applied Sciences and Technology 4, no. 6 (June 28, 2022): 18–28. http://dx.doi.org/10.47577/technium.v4i6.6791.
Повний текст джерелаRiza, Ferdy, Nurmala Sridewi, Amir Mahmud Husein, and Muhammad Khoiruddin Harahap. "Analisa Frekuensi Hasil Enkripsi Pada Algoritma Kriptografi Blowfish Terhadap Keamanan Informasi." Jurnal Teknologi dan Ilmu Komputer Prima (JUTIKOMP) 1, no. 1 (April 1, 2018): 11–15. http://dx.doi.org/10.34012/jutikomp.v1i1.233.
Повний текст джерелаHaryono, Wasis. "Comparison Encryption of How to Work Caesar Cipher, Hill Cipher, Blowfish and Twofish." Data Science: Journal of Computing and Applied Informatics 4, no. 2 (July 31, 2020): 100–110. http://dx.doi.org/10.32734/jocai.v4.i2-4004.
Повний текст джерелаSimanullang, Harlen Gilbert, and Arina Prima Silalahi. "ALGORITMA BLOWFISH UNTUK MENINGKATKAN KEAMANAN DATABASE MYSQL." METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi 4, no. 1 (March 10, 2018): 10–14. http://dx.doi.org/10.46880/mtk.v4i1.58.
Повний текст джерелаRen, Xun Yi, Jun Feng Zhang, Yang Yu, and Hai Ping Wan. "Hybrid Encryption Scheme of EOC Traffic." Advanced Engineering Forum 6-7 (September 2012): 907–12. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.907.
Повний текст джерелаQuilala, Rogel Ladia, and Theda Flare Ginoy Quilala. "Document verification using quick response code with modified secure hash algorithm-1 and modified blowfish algorithm." Indonesian Journal of Electrical Engineering and Computer Science 28, no. 1 (October 1, 2022): 470. http://dx.doi.org/10.11591/ijeecs.v28.i1.pp470-479.
Повний текст джерелаEt. al., Dr M. Buvana,. "Optimize Cryptography Algorithm for Efficient Data Security on Cloud Computing." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 1S (April 11, 2021): 459–64. http://dx.doi.org/10.17762/turcomat.v12i1s.1905.
Повний текст джерелаRifa’i, Annas, and Lilis Cucu Sumartini. "IMPLEMENTASI KRIPTOGRAFI MENGGUNAKAN METODE BLOWFISH DAN BASE64 UNTUK MENGAMANKAN DATABASE INFORMASI AKADEMIK PADA KAMPUS AKADEMI TELEKOMUNIKASI BOGOR BERBASIS WEB-BASED." Jurnal E-Komtek (Elektro-Komputer-Teknik) 3, no. 2 (November 12, 2019): 87–96. http://dx.doi.org/10.37339/e-komtek.v3i2.133.
Повний текст джерелаRaut, Kinjal. "A Comprehensive Review of Cryptographic Algorithms." International Journal for Research in Applied Science and Engineering Technology 9, no. 12 (December 31, 2021): 1750–56. http://dx.doi.org/10.22214/ijraset.2021.39581.
Повний текст джерелаSharma, Arvind K., and S. K. Mittal. "Cryptographic Merkle-Damgard Hash Construction: MD5 Vulnerabilities." Journal of Computational and Theoretical Nanoscience 17, no. 6 (June 1, 2020): 2435–40. http://dx.doi.org/10.1166/jctn.2020.8913.
Повний текст джерелаAlshannaq, Osama, Mohd Rizuan Baharon, Jamil Abedalrahim Jamil Alsayaydeh, Montaser B. A. Hammouda, Khalid Hammouda, Mohammad Mahmoud Nawafleh, and A. I. A. Rahman. "Analysis of the Lowest Memory Consumption (Memory Usage) Through Running Different Cryptography Techniques for Different Types of Images." Journal of Physics: Conference Series 2319, no. 1 (August 1, 2022): 012027. http://dx.doi.org/10.1088/1742-6596/2319/1/012027.
Повний текст джерелаIsiaka O.S., Murtala K., Ibraheem A.F., and Bolaji-Adetoro D.F. "HYBRIDIZATION OF RSA AND BLOWFISH CRYPTOGRAPHY ALGORITHMS FOR DATA SECURITY ON CLOUD STORAGE." International Journal of Engineering Technologies and Management Research 6, no. 12 (April 3, 2020): 29–34. http://dx.doi.org/10.29121/ijetmr.v6.i12.2019.471.
Повний текст джерелаSingh, Pankaj, and Sachin Kumar. "Study & analysis of cryptography algorithms : RSA, AES, DES, T-DES, blowfish." International Journal of Engineering & Technology 7, no. 1.5 (December 31, 2017): 221. http://dx.doi.org/10.14419/ijet.v7i1.5.9150.
Повний текст джерелаSolanki, Madan, and Prof (Dr ). Vrinda Tokekar. "Design and Implementation of Strong Security Architecture for Amazon Web Service based on Cloud Applications." International Journal of Innovative Technology and Exploring Engineering 11, no. 12 (November 30, 2022): 17–22. http://dx.doi.org/10.35940/ijitee.l9324.11111222.
Повний текст джерелаSaad, Mahaba, Khalid Youssef, Mohamed Tarek, and Hala Abdel-Kader. "Architecture of ASIP Crypto-Processor for Dynamic Runtime Security Applications." Indonesian Journal of Electrical Engineering and Computer Science 4, no. 2 (November 1, 2016): 412. http://dx.doi.org/10.11591/ijeecs.v4.i2.pp412-423.
Повний текст джерелаKumar, Pradeep, Kakoli Banerjee, Niraj Singhal, Ajay Kumar, Sita Rani, Raman Kumar, and Cioca Adriana Lavinia. "Verifiable, Secure Mobile Agent Migration in Healthcare Systems Using a Polynomial-Based Threshold Secret Sharing Scheme with a Blowfish Algorithm." Sensors 22, no. 22 (November 8, 2022): 8620. http://dx.doi.org/10.3390/s22228620.
Повний текст джерелаLalita Kumar Parvataneni, Mohith, Eswara Sai Nath Adusumalli, and Rajeshbabu C. "Secure and Efficient Query Processing Using Randomized Encryption and De-duplication on the Cloud." International Journal of Engineering & Technology 7, no. 2.24 (April 25, 2018): 311. http://dx.doi.org/10.14419/ijet.v7i2.24.12071.
Повний текст джерелаJabbar, Arshi, and Prof Umesh Lilhore. "Design and Implementation of Hybrid EC-RSA Security Algorithm Based on TPA for Cloud Storage." SMART MOVES JOURNAL IJOSCIENCE 3, no. 11 (November 30, 2017): 6. http://dx.doi.org/10.24113/ojsscience.v3i10.148.
Повний текст джерелаChandrasekaran, Jeyamala, and S. J. Thiruvengadam. "Ensemble of Chaotic and Naive Approaches for Performance Enhancement in Video Encryption." Scientific World Journal 2015 (2015): 1–11. http://dx.doi.org/10.1155/2015/458272.
Повний текст джерелаGoyal, Mani, and Avinash Sharma. "A Framework for Assessing Security Strength of Cloud Computing Service." Journal of Computational and Theoretical Nanoscience 16, no. 10 (October 1, 2019): 4389–93. http://dx.doi.org/10.1166/jctn.2019.8530.
Повний текст джерелаDener, Murat. "SDA-RDOS: A New Secure Data Aggregation Protocol for Wireless Sensor Networks in IoT Resistant to DOS Attacks." Electronics 11, no. 24 (December 15, 2022): 4194. http://dx.doi.org/10.3390/electronics11244194.
Повний текст джерелаAbdElminaam, DiaaSalama, Hatem M. Abdul Kader, Mohie M. Hadhoud, and Salah M. El-Sayed. "Developing and Evaluation of New Hybrid Encryption Algorithms." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 13, no. 1 (March 28, 2014): 4038–52. http://dx.doi.org/10.24297/ijct.v13i1.2926.
Повний текст джерелаAlabdulrazzaq, Haneen, and Mohammed N. Alenezi. "Performance Evaluation of Cryptographic Algorithms: DES, 3DES, Blowfish, Twofish, and Threefish." International Journal of Communication Networks and Information Security (IJCNIS) 14, no. 1 (April 15, 2022). http://dx.doi.org/10.17762/ijcnis.v14i1.5262.
Повний текст джерелаSeada Abdu Wakene, Sisay Muleta Hababa, Gutema Seboka Daba, and K S Ananda Kumar. "Data Storage Security in Mobile Cloud Computing (MCC) using Improved Blowfish Algorithm." International Journal of Scientific Research in Computer Science, Engineering and Information Technology, November 15, 2021, 100–111. http://dx.doi.org/10.32628/cseit217620.
Повний текст джерела"Two Layer Image Encryption using Symmetric Key Algorithms." International Journal of Innovative Technology and Exploring Engineering 9, no. 7 (May 10, 2020): 1056–59. http://dx.doi.org/10.35940/ijitee.g5285.059720.
Повний текст джерелаAlwazzeh, Muneer, Sameer Karaman, and Mohammad Nur Shamma. "Man in The Middle Attacks Against SSL/TLS: Mitigation and Defeat." Journal of Cyber Security and Mobility, July 1, 2020. http://dx.doi.org/10.13052/jcsm2245-1439.933.
Повний текст джерела"Security and Confidentiality of the Data using Block Level in Health Care System." International Journal of Recent Technology and Engineering 8, no. 2 (July 30, 2019): 2947–51. http://dx.doi.org/10.35940/ijrte.b2656.078219.
Повний текст джерела"An Encryption Algorithm for Enhanced Image Security." International Journal of Engineering and Advanced Technology 9, no. 1S5 (December 30, 2019): 81–84. http://dx.doi.org/10.35940/ijeat.a1020.1291s52019.
Повний текст джерела"Security Enhancement in Cryptography for Mobile Device Outsourced in Cloud Computing." International Journal of Innovative Technology and Exploring Engineering 9, no. 8 (June 10, 2020): 971–75. http://dx.doi.org/10.35940/ijitee.h6780.069820.
Повний текст джерелаKaviya, K., K. K. Shanthini, and M. Sujithra. "Evolving Cryptographic Approach for Enhancing Security of Resource Constrained Mobile Device Outsourced Data in Cloud Computing." International Journal of Scientific Research in Computer Science, Engineering and Information Technology, January 5, 2019, 101–6. http://dx.doi.org/10.32628/cseit195111.
Повний текст джерелаBarhoom, Tawfiq, and Mahmoud Abu Shawish. "Text File Privacy on the Cloud Based on Diagonal Fragmentation and Encryption." Journal of Engineering Research and Technology 8, no. 1 (March 3, 2021). http://dx.doi.org/10.33976/jert.8.1/2021/3.
Повний текст джерела"Enhancing Image Security by employing Blowfish Algorithm further embedding text and Stitching the RGB components of a Host Image." International Journal of Recent Technology and Engineering 8, no. 2S11 (November 2, 2019): 3801–8. http://dx.doi.org/10.35940/ijrte.b1499.0982s1119.
Повний текст джерелаKhalaf, Ali Mahmood, and Kamaljit Lakhtaria. "A SURVEY ON SYMMETRIC-KEY AND ASYMMETRIC- KEY ALGORITHMS BASED CRYPTOGRAPHY." Towards Excellence, March 31, 2022, 361–77. http://dx.doi.org/10.37867/te140134.
Повний текст джерелаDas, Proteeti, Najmul Hoque Munshi, and Subhasis Maitra. "New Key-Dependent S-Box Generation Algorithm on AES." Micro and Nanosystems 13 (July 26, 2021). http://dx.doi.org/10.2174/1876402913666210726163822.
Повний текст джерела