Estrategias algorítmicas orientadas a la ciberseguridad: Un mapeo sistemático

CA Orozco Bonilla - 2021 - dspace.ups.edu.ec
Existen diferentes estrategias para proteger la información que está en un ambiente
cibernético, en este documento se revisaron y presentaron algunas alternativas de …

A Case Study of using Cryptography for the Improvement of Data Security in E-commerce Industry in the Philippines

EB Blancaflor, LAM Competente… - … on Computer and …, 2023 - ieeexplore.ieee.org
Data security is a major concern in the e-commerce industry in the Philippines, leading to
trust issues among customers regarding the safety of their personal information …

A decentralised blockchain-based secure authentication scheme for IoT devices

EA Haqani, Z Baig, F Jiang - … Systems and Control: Proceedings of ICISC …, 2022 - Springer
Internet of things (IoT) is a paradigm comprising smart and embedded devices that
communicate with each other over communication channels. As the connectivity is mostly …

Towards the design of new cryptographic algorithm and performance evaluation measures

A Farooq, S Tariq, A Amin, MA Qureshi… - Multimedia Tools and …, 2024 - Springer
Security and confidentiality are one of the main concerns when transmitting multimedia data
over the Internet. To deal with the arising security issues, many advanced cryptographic …

Implementation of dynamic scanner to protect the documents from ransomware using machine learning algorithms

R Surendran, R Karthika… - … Computing, Electronics & …, 2021 - ieeexplore.ieee.org
Now-a-days malware analysis and detection is the most needed tool in today's world. The
malware attack is rapidly increasing in all areas especially in corporate sectors. Though …

Critical analysis of cryptographic algorithms

M AlRoubiei, T AlYarubi… - 2020 8th International …, 2020 - ieeexplore.ieee.org
Security is the most important role in data communication due to the increase of the
intruder's possibility of alteration and eavesdropping to the sensitive data. Hence …

[PDF][PDF] A Novel ASCII Code-based Polybius Square Alphabet Sequencer as Enhanced Cryptographic Cipher for Cyber Security Protection (APSAlpS-3CS)

JCT Arroyo, ARL Reyes… - International Journal of …, 2020 - researchgate.net
For all industries, cybersecurity is regarded as one of the major areas of concern that needs
to be addressed. Data and information in all forms should be safeguarded to avoid leakage …

[PDF][PDF] An Improved Affine Cipher using Blum Blum Shub Algorithm

JCT Arroyo, AJP Delima - International Journal, 2020 - researchgate.net
Information and data security is the practice of digital privacy measures against illegal
inspection, access, disclosure, use, recording, disruption, modification, or destruction of data …

[PDF][PDF] A robust review of sha: Featuring coherent characteristics

G Shaheen - International Journal of Computer Science and …, 2020 - researchgate.net
Secure hashing algorithms produces a message digest based on principles similar to those
used in the design of the MD4 and MD5 message digest algorithms, but has a more …

Probabilistic mathematical modelling for security risk assessment

D Kolev - 2021 - theses.gla.ac.uk
This thesis presents a novel framework for security risk assessment (SRA) and identification,
comprising mathematical algorithms and a family of models. Recently, due to the growing …