An encryption and decryption model for data security using vigenere with advanced encryption standard

UI Erondu, EO Asani, MO Arowolo, AK Tyagi… - … Systems, Tools, and …, 2023 - igi-global.com
As the amount of data being sent has risen dramatically in recent years; protecting that data
has become increasingly important. Cryptography is the process of transforming plain text …

A novel MADM technique based on projection methods under q-rung orthopair fuzzy setting and its application to computer network security evaluation

W Qiao - Journal of Intelligent & Fuzzy Systems, 2023 - content.iospress.com
Computer network security evaluation is a basic work to determine the security performance
of the network system and implement the network security management. It involves …

Large Integer Decomposition Encryption Algorithm for Computer Network Data Communication Combined with Double BP Neural Network Combination Model

D Li, S Xiong, G Yuan - Procedia Computer Science, 2023 - Elsevier
Usually a complete computer network system has the following components: source of
signals, signal host, cryptographic regime, attack, and interceptor. It is more vulnerable to …

Improving computer network security evaluation with grey relational analysis and probabilistic simplified neutrosophic sets

H Wang - International Journal of Knowledge-based and …, 2023 - content.iospress.com
The popularity of computer network has provided great convenience for people's work and
life, but it has also brought corresponding information security problems. It is very important …

Projection measure-driven optimization of q-rung orthopair fuzzy MAGDM for computer network security evaluation

Y Jiang, X Wang - … Journal of Knowledge-based and Intelligent …, 2024 - content.iospress.com
The computer network environment is very complex, and there are many factors that need to
be considered in the process of network security evaluation. At the same time, various …

Enhanced computer network security assessment through employing an integrated LogTODIM-TOPSIS technique under interval neutrosophic sets

Q Sun, L Yang - International Journal of Knowledge-based and … - content.iospress.com
In the context of the development of the new era, computer network technology has become
an indispensable and important technological means in people's daily work and life …

[PDF][PDF] Main mechanisms of blockchain technology implementation in digital technologies application

GG Shvachych, BI Moroz, IA Pobochii… - Natsional'nyi …, 2022 - crust.ust.edu.ua
Purpose. To analyze the basic principles of blockchain technology implementation,
highlighting the algorithms for reaching consensus in the blockchain network to ensure its …

[HTML][HTML] Науковий вісник НГУ

HH Shvachych, OV Ivaschenko, YY Fedorov… - nvngu.in.ua
Purpose. To analyze the basic principles of blockchain technology implementation,
highlighting the algorithms for reaching consensus in the blockchain network to ensure its …