Performance evaluation of advanced encryption standard algorithm

DF García - … Conference on Mathematics and Computers in …, 2015 - ieeexplore.ieee.org
Nowadays the confidentiality of information is an issue of primary importance. Generally,
confidentiality is obtained by encrypting/decrypting the information with a symmetric …

Enkripsi Data Menggunakan Advanced Encryption Standart 256

Y Wiharto, A Irawan - Kilat, 2018 - jurnal.itpln.ac.id.aiotech.id
Cryptography is important in securing data and information. Confidential, important
information may not be publicly or otherwise protected. It is not impossible for anyone to see …

[HTML][HTML] Review of algorithms for securing data transmission in mobile banking

DO Orucho, FM Awuor, R Makiya, C Oduor - Modern Economy, 2023 - scirp.org
With the dawn of mobile banking applications, bank customers can now register for M-
banking and download applications that aid them to access services from the bank server …

[PDF][PDF] VERİ ŞİFRELEME ALGORİTMALARININ KULLANIMI İÇİN AKILLI BİR SEÇİM SİSTEMİ GELİŞTİRİLMESİ

M Yılmaz, S Ballı - Uluslararası Bilgi Güvenliği Mühendisliği Dergisi, 2016 - dergipark.org.tr
Günlük hayatta zamanı ve enerji parametrelerini verimli kullanmak çok önem kazanmı ş tır.
Yapılan her çalı ş mada bu parametreler seçimleri do ğ rudan etkilemektedir. Ş ifreleme …

Blowfish algorithm implementation on electronic data in a communication network

RS Cordova, RLR Maata… - … Conference on Electrical …, 2019 - ieeexplore.ieee.org
Data, information, and knowledge are valuable assets of most business organizations.
Protecting and securing these assets is crucial to their success. Computer security systems …

Hybrid Encryption Scheme (HES): An approach for transmitting secure data over internet

R Singh, I Panchbhaiya, A Pandey… - Procedia Computer …, 2015 - Elsevier
Internet and network application are growing at very fast rate, so the need to protect such
application are increased. This paper solves this problem by proposing two different …

[PDF][PDF] A survey on different secret key cryptographic algorithms

HB Pethe, S Pande - IBMRD's Journal of Management & Research, 2014 - Citeseer
Today's internet world is very competitive and to survive in such a competitive world there
must be a secure environment to communicate. Internet and network applications are …

Multi-criteria usability evaluation of symmetric data encryption algorithms in fuzzy environment

S Balli, M Yilmaz - SN Applied Sciences, 2020 - Springer
Effective use of parameters such as time, resources, and energy is a crucial subject in daily
life. These parameters directly influence the selection strategy in decision-making problems …

An Empirical Evaluation of Encryption and Decryption Times on Block Cipher Techniques

F Olajide, K Assa-Agyei, C Edo - 2023 Congress in Computer …, 2023 - ieeexplore.ieee.org
The significant majority of individuals in today's technology environment use the Internet for
various purposes. Most often, data sent via the Internet contains private or confidential …

Performance Evaluation of Symmetric Encryption Algorithms Using MCDM Methods

D Das, S Roy, K Gupta, B Sahoo - 2022 IEEE 2nd International …, 2022 - ieeexplore.ieee.org
Data and information are found to be stored, processed or transferred with the support of
modern technological tools and hardware specifications. Due to the increase in the usage of …