M AlRoubiei, T AlYarubi… - 2020 8th International …, 2020 - ieeexplore.ieee.org
Security is the most important role in data communication due to the increase of the intruder's possibility of alteration and eavesdropping to the sensitive data. Hence …
ME Haque, SM Zobaed, MU Islam… - 2018 21st International …, 2018 - ieeexplore.ieee.org
In this paper, we provide a comprehensive performance evaluation of popular symmetric and asymmetric key encryption algorithms to selecting better utilization on resource …
Today, with a wide use of internet all across the globe where it has become a significant tool of commerce, security and protection of information becomes a vital issue to deal with …
MB Yassein, S Aljawarneh… - … on engineering and …, 2017 - ieeexplore.ieee.org
Cloud computing emerged in the last years to handle systems with large-scale services sharing between vast numbers of users. It provides enormous storage for data and …
A Kubadia, D Idnani, Y Jain - 2019 3rd International …, 2019 - ieeexplore.ieee.org
The paper presents a comparative analysis of different symmetric keying cryptographic algorithms. The algorithms under study are AES, ARC2, Blowfish, CAST and DES3, and the …
MGV Kumar, US Ragupathy - 2016 International Conference …, 2016 - ieeexplore.ieee.org
Internet applications are increased and growing at very fast. Owing towards the technological development, secured way of data transmission over the internet is becoming …
SD Sanap, V More - 2021 International Conference on …, 2021 - ieeexplore.ieee.org
The process of digitization observed among various industries has led to significant amount of collection, processing, sharing and alteration of data. The rapid continuous increase in …