[PDF][PDF] Data security using random dynamic salting and AES based on master-slave keys for Iraqi dam management system

HJ Ali, TM Jawad, H Zuhair - Indones. J. Electr. Eng. Comput. Sci, 2021 - researchgate.net
In the present time, dam management is considered one of the important challenges for e-
government in Iraq, becuase it needs information technology infrastructure, data integrity …

Computer data encryption system based on nonlinear partial differential equations

J Yang - Mobile Information Systems, 2022 - Wiley Online Library
Data encryption is to convert plaintext data into ciphertext through a data encryption
algorithm and then transmit the ciphertext. After the recipient receives the ciphertext, the …

Digital supply chain development in blockchain technology using Rijndael algorithm 256

FA Susilo, YS Triana - IOP Conference Series: Materials Science …, 2018 - iopscience.iop.org
Abstract Information hollering through electronic links occurs across organizational
boundaries with interagency that allow automatic exchange of electronic data between …

[PDF][PDF] Column-Level Database Encryption Using Rijndael Algorithm and Dynamic Key on Learning Management System

AS Mursalat, AM Barmawi… - Indonesia Journal on …, 2022 - socj.telkomuniversity.ac.id
Column-Level Database Encryption Using Rijndael Algorithm and Dynamic Key on Learning
Management System Page 1 1 Column-Level Database Encryption Using Rijndael Algorithm and …

[PDF][PDF] Securing the Cloud Storage by Using Different Algorithms of Cryptography

M Jan, Q Shahzad, S Afsar - Int. J. Sci. Res. in Computer Science …, 2022 - researchgate.net
Accepted: 02/Apr/2022, Online: 30/Apr/2022 Abstract—Cloud Computing offers services via
the internet that allows for virtual servers, dynamic memory pools, as well as easy access …

RC5-CBC: best matching combination of block cipher and model of operation for implementing ORAM schemes

C Sun, R Li - International Conference on Cryptography …, 2023 - spiedigitallibrary.org
The encryption and decryption time of semantically secure encryption techniques have a
great influence on the total end-to-end delay of an ORAM scheme. However, to the best of …

Memory Confidentiality and Integrity Protection Technology

H Wang, H Meng, N Yao, Y Cheng - … of the 2018 CSPS Volume III …, 2020 - Springer
In most existing computer systems, data transmission and preservation in the form of
plaintext are vulnerable to various attacks. In this paper, we use Parralelized memory …