Securing Data Files Using RSA-ElGamal and Diffie-Hellman Algorithms

A Sitohang, R Rosnelly… - Proceeding of …, 2024 - prosiding-icostec.respati.ac.id
Data security involves efforts to protect and ensure three key aspects in the cyber realm: the
confidentiality, integrity, and availability of data. It assures cyber users that their privacy is …

A Framework to Ensure Data Integrity and Safety

E Paulus, MA Fauzan - Data Science: Journal of Computing and …, 2018 - talenta.usu.ac.id
The technology development allows people to more easily communicate and convey
information. The current communication media can facilitate its users to send and receive …

Secure RSA based Text File Encryption and Decryption using LabVIEW

TP Sai, S Rohan, M Yasmeen, S Shafi - Engineering, Science, and … - taylorfrancis.com
In the recent past, the usage of digital platforms like, online banking, e-shopping and
reservations have gained incredible popularity. This is due to the rapid development of …

IMPLEMENTATION OF RSA (RIVEST SHAMIR ADLEMAN) ALGORITHM CRYPTOGRAPHY FOR FILE SECURITY (Case Study: CV. Hardi Junior)

B SERMA BR LIMBONG - 2022 - eprints.uty.ac.id
Digital technology is an information technology that facilitates various human activities
ranging from communication, information, transactions, education, entertainment to even the …

[PDF][PDF] Achieving data integrity by forming the digital signature using RSA and SHA-1 algorithm

I Shingari, SS Verma - IOSR Journal of Computer Engineering, 2013 - researchgate.net
Technology has been touching our lives in almost every domain. With the advent of modern
technologies, the need of enhancing its security also arises. Data security has become one …

Securing the integrity of PDF files using RSA digital signature and SHA-3 hash function

A Sharif, DS Ginting, AD Dias - 2021 International Conference …, 2021 - ieeexplore.ieee.org
Signatures are used on documents as written proof that the document was verified by the
person indicated. Signature also indicated that the document originated from the signer if the …

[PDF][PDF] Secure spreadsheet data file transferring system

CN Tun, KT Mya - 2010 - meral.edu.mm
Advent technology of security for secret important data and information is called the
Cryptography. Cryptography is an important aspect of communications security and is a …

[PDF][PDF] Development of Improved Rivest Shamir and Adleman (RSA) Algorithm for Securing Data on Transmission and Storage. 1Adejumobi, OK, 2Sadiq, MO 3Baruwa …

A Scholar - 2021 - africanscholarpublications.com
In present times, the high growth in the networking technology leads to the practice of
interchanging digital data frequently. The data in both the private and public sectors are …

Enhancement in data security and integrity using minhash technique

S Abed, L Waleed, G Aldamkhi… - Indones. J. Electr. Eng …, 2021 - garuda.kemdikbud.go.id
Data encryption process and key generation techniques protect sensitive data against any
various attacks. This paper focuses on generating secured cipher keys to raise the level of …

[PDF][PDF] A security solution for the transmission of confidential data and efficient file authentication based on DES, AES, DSS and RSA

R Chaudhary, P Singh, A Agarwal - International Journal of Innovative …, 2012 - Citeseer
Data security is an integral part of web based business applications like insurance, banking
etc. These applications require a secure infrastructure to meet the security requirements of …