Data has become increasingly popular for advanced digital content transmission. Researchers are concerned about the protection of data. The transmission of digital data …
TFG Quilala, AM Sison, RP Medina - Indonesian Journal of …, 2018 - researchgate.net
Cryptography guarantees security in communication through encryption. This paper proposed a modified Blowfish encryption that uses 128-bit block size and 128-bit key to …
SRP Rao, K Jyothi - 2022 Second International Conference on …, 2022 - ieeexplore.ieee.org
Today security and privacy of user from unauthorized access, corruption, or theft is becoming more crucial requirement due to increased use of internet and communication …
A Sayed, M Mahrous, E Elgeldawi - CMC-COMPUTERS MATERIALS …, 2023 - academia.edu
Securing digital data from unauthorized access throughout its entire lifecycle has been always a critical concern. A robust data security system should protect the information assets …
ABSTRACT A new text encryption algorithm which is based upon a combination between Self-Synchronizing Stream Cipher and chaotic map has been proposed in this paper. The …
S Muryanah, S Syam - Syntax: Jurnal Informatika, 2021 - journal.unsika.ac.id
Pada umumnya di dalam kampus, perusahaan atau organisasi, suatu dokumen digital disimpan di dalam komputer begitu saja tanpa adanya pengamanan sama sekali, sehingga …
AS Amin - BS Comms, IET Faculty, GUC, Cairo, Egypt, 2019 - researchgate.net
Today's information world is a digital world where Data transmission over an insecure channel is becoming a major issue of concern. So to protect the secret data from theft …
TS Algaradi, B Rama - Journal of Engineering Science and …, 2021 - jestec.taylors.edu.my
There are diverse methods and technologies adopted by authors studied to Keep up with the rapid progress of big data technology in securing big data in the field of cryptography …
SS Susilabai, DS Mahendran… - 2021 5th International …, 2021 - ieeexplore.ieee.org
Security has become the main issue in the current data transmission, whereas it is considered as a significant goal for vendors and providers of cloud services. Hyper elliptic …