Treffer 1 - 20 von 1.044

1

Cryptographic method based on Catalan objects and enumerative chess problem
Distributed Denial of Service Attacks. Dec 09, 2024

Buch
Merkliste
2

Cryptolysis: A Framework for Verification of Optimization Heuristics for the Automated Cryptanalysis of Classical Ciphers and Natural Language Word Segmentation
Mokhov, Serguei A.
2010 Eighth ACIS International Conference on Software Engineering Research, Management and Applications Software Engineering Research, Management and Applications (SERA), 2010 Eighth ACIS International Conference on. :295-302 May, 2010

Konferenz
Merkliste
3

Cryptography and Cryptanalysis in Java ; Creating and Programming Advanced Algorithms with Java SE 17 LTS and Jakarta EE 10
Nita, Stefania Loredana ; Mihailescu, Marius Iulian
ISBN 9781484281048 9781484281055.

Buch
Merkliste
4

One-Time Pad Cryptography for Secure Data Transmission in IoT Smart Door Using QR Code.
Asrofa, Muhammad Dito ; Bahri, Syamsul ; Kasliono
Jurnal Media Informasi Teknologi; okt2025, Vol. 2 Issue 2, p133-148, 16p

CRYPTOGRAPHY DATA encryption SECURITY management STREAM ciphers DATA transmission system... TWO-dimensional bar code...
Fachzeitschrift
Merkliste
5

Java Cryptography Architecture
Nita, Stefania Loredana ; Mihailescu, Marius Iulian
Cryptography and Cryptanalysis in Java ; page 55-76 ; ISBN 9798868804403 9798868804410

Buch
Merkliste
6

Secure DNA Cryptosystem for Data Protection in Cloud Storage and Retrieval.
Murugan, Thangavel ; Perumal, Varalakshmi ; Badusha, Nasurudeen Ahamed Noor Mohamed
Computers (2073-431X); Dec2025, Vol. 14 Issue 12, p544, 43p

CLOUD storage CRYPTOGRAPHY INFORMATION retrieval COMPUTATIONAL complexity CONFIDENTIAL records DATA protection
Fachzeitschrift
Merkliste
7

An efficient practical alternative to ECC by Pell curve cryptography with a new vision.
Elumalai, R. ; Anjaneyulu, G. S. G. N.
Cryptologia; 2026, Vol. 50 Issue 1, p1-41, 41p

CRYPTOGRAPHY KEY agreement protocols... FINITE groups ENCRYPTION protocols
Fachzeitschrift
Merkliste
8

HKC-MBLT: Enhancing SaaS transaction security with hybrid cryptography and memory-based lightweight tokenization for IoT-enabled cyber-physical systems.
Okafor, Kennedy Chinedu ; Longe, Omowunmi Mary ; Ezeja, Michael Obinna ; et al.
Cogent Engineering; Dec2025, Vol. 12 Issue 1, p1-33, 33p

INTERNET of things CRYPTOGRAPHY INTERNET security DATA security SOFTWARE as a service PAYMENT systems
Fachzeitschrift
Merkliste
9

Enhancing mobile agent protection using a hybrid security framework combining pretty good protocol and code obfuscation.
Zraqou, Jamal ; Alkhadour, Wesam ; Baklizi, Mahmoud ; et al.
International Journal of Electrical & Computer Engineering (2088-8708); Aug2025, Vol. 15 Issue 4, p3913-3927, 15p

MOBILE agent systems DATA encryption INTERNET security CRYPTOGRAPHY DATA protection software INTELLIGENT agents
Fachzeitschrift
Merkliste
10

Java Cryptography Architecture
Nita, Stefania Loredana ; Mihailescu, Marius Iulian
Cryptography and Cryptanalysis in Java ; page 29-46 ; ISBN 9781484281048 9781484281055

Buch
Merkliste
11

On the Homomorphic Properties of Kyber and McEliece with Application to Post-Quantum Private Set Intersection.
Abudaqa, Anas A. ; Alshehri, Khaled ; Felemban, Muhamad
Cryptography (2410-387X); Dec2025, Vol. 9 Issue 4, p66, 28p

CRYPTOGRAPHY PUBLIC key cryptography HOMOMORPHISMS
Fachzeitschrift
Merkliste
12

CAXSS: A Cookie Authentication Scheme Against XSS Attacks for HTTPS.
Shi, Yingjuan ; Ma, Maode ; Wang, Hui
Electronics (2079-9292); Jan2026, Vol. 15 Issue 1, p82, 30p

DIGITAL signatures ELLIPTIC curve cryptogra... INTERNET security WEBSITE security
Fachzeitschrift
Merkliste
13

Elliptic Curve Cryptography and Biometrics for IoT Authentication.
Dargaoui, Souhayla ; Azrour, Mourade ; El Allaoui, Ahmad ; et al.
Serbian Journal of Electrical Engineering; Jun2025, Vol. 22 Issue 2, p223-241, 19p

ELLIPTIC curve cryptogra... BIOMETRIC identification COMPUTER network protoco... DATA security failures DATA privacy SECURITY management
Fachzeitschrift
Merkliste
14

Achieving Enhanced Efficiency and Security in IoT: A Hybrid Encryption Approach with ECC and Blowfish.
Olamaei, S. A. ; Jezehei, M. Baghaei ; Broumandnia, A.
International Journal of Engineering Transactions B: Applications; May2026, Vol. 39 Issue 5, p1238-1253, 16p

ELLIPTIC curve cryptogra... ENCRYPTION protocols COMPUTER performance MULTICORE processors DATA security
Fachzeitschrift
Merkliste
15

Multilayered digital image encryption approach to resist cryptographic attacks for cybersecurity.
Das, Sanjay ; Jagan, Lotugada ; Singh, Gaurav Kumar ; et al.
PeerJ Computer Science; Oct2025, p1-27, 27p

IMAGE encryption CRYPTOGRAPHY DATA encryption DATA protection software ELLIPTIC curve cryptogra... ADVANCED Encryption Stan...
Fachzeitschrift
Merkliste
16

A secure and energy-efficient authentication framework for the internet of electric things.
Itoo, Samiulla ; Kumar, Vinod ; Ahmad, Musheer
Cluster Computing; Oct2025, Vol. 28 Issue 6, p1-19, 19p

ELLIPTIC curve cryptogra... TELECOMMUNICATION INTERNET of things ELECTRIC power distribut... DATA integrity
Fachzeitschrift
Merkliste
17

Cryptology as a Way to Teach Advanced Discrete Mathematics.
Bunde, David P. ; Dooley, John F.
Primus: Problems, Resources & Issues in Mathematics Undergraduate Studies; 2024, Vol. 34 Issue 1, p41-53, 13p

DISCRETE mathematics ABSTRACT algebra COMPUTER security NUMBER theory CRYPTOGRAPHY MATHEMATICS education
Fachzeitschrift
Merkliste
18

A Machine Learning-Based Hybrid Encryption Approach for Securing Messages in Software-Defined Networking.
Pokhrel, Chitran ; Ghimire, Roshani ; Dawadi, Babu R. ; et al.
Network (2673-8732); Mar2025, Vol. 5 Issue 1, p8, 36p

SOFTWARE-defined network... DATA privacy NETWORK performance CRYPTOGRAPHY CONFIDENTIAL communicati...
Fachzeitschrift
Merkliste
19

PRIVocular: Enhancing User Privacy Through Air-Gapped Communication Channels.
Bikos, Anastasios N.
Cryptography (2410-387X); Jun2025, Vol. 9 Issue 2, p29, 29p

PRIVACY CRYPTOGRAPHY VIRTUAL reality software SMART devices DATA transmission system... INTERNET of things
Fachzeitschrift
Merkliste
20

CRYPTANALYSIS OF ITRU.
Hashim, Hayder R. ; Molnár, Alexandra ; Tengely, Szabolcs
Rad HAZU: Matematicke Znanosti; 2021, Vol. 25, p181-193, 13p

CRYPTOGRAPHY POLYNOMIAL rings CRYPTOSYSTEMS FREQUENCIES of oscillati... PUBLIC key cryptography
Fachzeitschrift
Merkliste

Filter