RC6 based data security and attack detection

N Varshney, K Raghuwanshi - Proceedings of First International …, 2016 - Springer
Java server pages (JSP) and Hypertext Preprocessor (PHP) are the most common scripting
language which is used for web designing. Both are used with Hyper Text Markup …

An efficient AES and RC6 based cloud-user data security with attack detection mechanism

S Bhute, SK Arjaria - International Journal of Advanced …, 2016 - search.proquest.com
This paper proposed an efficient framework for text data security. In this framework the data
is totally controlled by the user and the user security is controlled by the cloud server. For …

[PDF][PDF] Email encryption using RC4 algorithm

MK Pehlivanoğlu, N Duru - International Journal of Computer Applications, 2015 - Citeseer
In the communication age, in the daily life people constantly uses communication tools that
are e-mail marketing, instant messaging, social networking, search engines, bookmarking …

RC4 Cryptography Implementation Analysis on Text Data

ASY Irawan, AR Pratama… - JURNAL SISFOTEK …, 2021 - journal.global.ac.id
Security and confidentiality have become very important and continue to grow. In recent
years, there have been several cases involving data security, such as the leaking of …

Improving stored data security in Cloud using Rc5 algorithm

J Singh, B Kumar, A Khatri - 2012 Nirma University …, 2012 - ieeexplore.ieee.org
Cloud Computing is technology for next generation Information and Software enabled work
that is capable of changing the software working environment. It is interconnecting the large …

Enhancing security of cloud computing by using RC6 encryption algorithm

SA Abbas, MQ Mohammed - International Journal of Applied Information …, 2017 - ijais.org
Cloud computing give an impression of being an extremely well known and famous
computing technology. Each person is utilizing cloud computing straightforwardly or …

Web service implementation in logistics company uses JSON web token and RC4 cryptography algorithm

MR Royani, A Wibowo - Jurnal RESTI (Rekayasa Sistem dan …, 2020 - jurnal.iaii.or.id
The development of e-commerce in Indonesia in the last five years has significantly
increased the growth for logistics service companies. The Indonesian Logistics and …

[PDF][PDF] Secure cloud computing with RC4 encryption and attack detection mechanism

L Mishra, A Sharma - International Journal of Computer Applications, 2015 - Citeseer
The growing requirement of system resources, memory requirement and huge space etc.
have sprinted up the demand of cloud computing. The ease in the use and dynamic demand …

Penerapan Algoritme Kriptografi RC6 Untuk Mengamankan File Penjualan Dan Gambar Produk Alisan

S Siswanto, BH Prasetyo, M Anif, A Saputro… - Prosiding …, 2023 - seminar.iaii.or.id
Problems that commonly occurred in this period were that the sales data for Alisan products
in several stores was falsified and there were quite large differences that did not match the …

[PDF][PDF] Evaluation of the RC4 algorithm for data encryption.

A Mousa, A Hamad - Int. J. Comput. Sci. Appl., 2006 - staff-old.najah.edu
Abstract Analysis of the effect of different parameters of the RC4 encryption algorithm where
examined. Some experimental work was performed to illustrate the performance of this …