[PDF][PDF] Securing Sensitive Digital Data in Educational Institutions using Encryption Technology

WK ElSaid - International Journal of Computer Science and …, 2018 - academia.edu
… The main goal of the current study is to protect the content of digital … study is to employ the
encryption technology in the education sector by designing an electronic system for securing

Practical application of computer network security data encryption technology based on Cloud Computing

W Zhao - … on Aviation Safety and Information Technology, 2021 - dl.acm.org
… , it is of great practical significance to study the application of data encryption technology in
… The above data encryption methods can provide good protection for transaction information …

Countermeasures and System Design of Campus Network Information Security Defense Based on Data Encryption Technology

L Yan, F Gao, D Li, S Li, X Zhang - 2020 IEEE 3rd International …, 2020 - ieeexplore.ieee.org
… It replaces the protected information into secret text by various methodsresearch of digital
encryption technology is of great significance to ensure the information security of computer

[PDF][PDF] Network security and cryptography challenges and trends on recent technologies

S Naeem - Journal of Applied and Emerging Sciences, 2023 - researchgate.net
… sizes was the primary method employed in this study. It is also the same for the 128-piece …
Cryptography protects networks. This paper discusses cryptography research and algorithms

A succinct analytical study of the usability of encryption methods in healthcare data security

Abhishek, HK Tripathy, S Mishra - Next Generation Healthcare Informatics, 2022 - Springer
… One of the major techniques involved is encryption. In this chapter, we are going to … protected
health information (PHI) can be protected with the help of various encryption techniques. It …

[PDF][PDF] Enhanced encryption technique for secure iot data transmission

R Bhandari, VB Kirubanand - … of Electrical and Computer …, 2019 - pdfs.semanticscholar.org
cryptographic process using AES algorithm. This model can be called as multi-phase
protection … This research was completed successfully under the guidance of Kirubanand VB, Dr. …

The application of software defined networking on securing computer networks: A survey

R Sahay, W Meng, CD Jensen - Journal of Network and Computer …, 2019 - Elsevier
… of SDN on enhancing the security of computer networks. In particular, we survey recent
research studies that focus on applying SDN for network security including attack detection and …

DATABASE SECURITY AND STUDY OF DATA ENCRYPTION METHODS IN CLOUD STORAGE

Y Shcherbinina, B Martseniuk… - … , навігації та зв'язку …, 2020 - journals.nupp.edu.ua
… and makes an in depth review of various encryption techniques. … encryption schemes have
been developed in order to protect the … Data encryption techniques are required to protect the …

[PDF][PDF] Protecting private data using improved honey encryption and honeywords generation algorithm

T Win, KSM Moe - 2018 - meral.edu.mm
method in honey encryption algorithm. Furthermore, we also propose hashing and salting
algorithm for securing … In this paper, we describe the case studies as a calculation of DTE and …

Handbook of computer networks and cyber security

BB Gupta, GM Perez, DP Agrawal, D Gupta - Springer, 2020 - Springer
… requires high-end protection from the adversarial … research papers and projects related to
computer network security and forensics research, including the topics of multi-boot computer