Search

Your search keyword '"Triple DES"' showing total 852 results

Search Constraints

Start Over You searched for: Descriptor "Triple DES" Remove constraint Descriptor: "Triple DES" Language undetermined Remove constraint Language: undetermined
852 results on '"Triple DES"'

Search Results

1. A Novel Scrambled Data Hiding Approach Towards Securing Sensitive Data

2. A Hybrid Cryptographic Scheme for Improving Cloud Security Using ECC and TDES Algorithms

3. NETWORK SECURITY BY BLOCK CIPHERS

4. Comparative Study of Different Cryptographic Algorithms

5. An E-health System for Encrypting Biosignals Using Triple-DES and Hash Function

6. Hybrid approach for Data Aggregation in cloud

7. Subject Review: Comparison Between 3DES, AES and HiSea Algorithms

8. Intelligent TRIPLE DES with N Round Based on Genetic Algorithm

9. An efficient method for fault tolerance in cloud environment using encryption and classification

10. Secure Transmission of DICOM Images by comparing different cryptographic algorithms

11. Power system real time data encryption system based on DES algorithm

12. Transmission of Encrypted data in WSN: An Implementation of Hybridized RSA-TDES Algorithm

13. Introduction Advanced Encryption Standard (AES)

14. A Comparative Analysis of Cryptographic Algorithms in the Internet of Things

15. Performance Level Evaluation of Cryptographic Algorithms

16. A Survey on Performance Analysis of Block Cipher Algorithms

17. A Dynamic Round Triple Data Encryption Standard Cryptographic Technique for Data Security

18. Triple DES: Privacy Preserving in Big Data Healthcare

19. A Network Coding and DES Based Dynamic Encryption Scheme for Moving Target Defense

20. RFID Tag Data Encryption Using Triple DES and RSA Algorithms

21. Securing the PRESENT Block Cipher Against Combined Side-Channel Analysis and Fault Attacks

25. Performance Evaluation of Authentication-Encryption and Confidentiality Block Cipher Modes of Operation on Digital Image

26. Fault analysis on Kalyna

28. POEx: A beyond-birthday-bound-secure on-line cipher

30. An efficient symmetric image encryption algorithm based on an intertwining logistic map

31. An optimized DNA based encryption scheme with enforced secure key distribution

32. Text data partitioning and image based RC5 encryption with block based key generation

36. Modified Hill Cipher Based Image Encryption Technique

39. BORON: an ultra-lightweight and low power encryption design for pervasive computing

40. A Flexible Data Scheduling Scheme for Block Cipher Processor

41. Partial Image Encryption using RC4 Stream Cipher Approach and Embedded in an Image

42. Meet-in-the-Middle Attack on 11-Round 3D Block Cipher

43. A Fast FPGA Implementation for Triple DES Encryption Scheme

44. Automatic Security Analysis of EPCBC against Differential Attacks

45. Survey in Finding the Best Algorithm for Data Analysis of Privacy Preservation in Healthcare

46. Heresy: A Serverless Web Application to Store Compressed and Encrypted Document in the Form of URL

47. Multi Authority Privacy Preserving Protocol in Cloud Computing Authentication using Grouping Algorithm and EDAC-MAC

48. Speedup for Cryptography on CUDA Heterogeneous Architecture

49. Indefinite block ciphering based on variable and great length key

50. A Crypto-processor Supporting Multiple Block Cipher Algorithms

Catalog

Books, media, physical & digital resources