Analysis of Monitored Binary Execution to Identify Data Modifications and Cryptographic Operations Journal title: International Journal of Science and Research (IJSR) Authors: Subject(s):
Implementation of Highly Secured Log Management System over Cloud Journal title: International Journal of Science and Research (IJSR) Authors: Subject(s):
Enhancing Cloud Data Security and Integrity Using Third Party Auditing Service Journal title: International Journal of Science and Research (IJSR) Authors: Subject(s):
A SURVEY ON REDUNDANT ELIMINATION [RE] PROTOCOL FOR AVOID COLLUSION ATTACK VIDEO DELIVERY Journal title: Elysium Journal of Engineering Research and Management Authors: Sundar C, Balakrishnan L Subject(s):
Merkle-Damgård Construction Method and Alternatives: A Review Journal title: Journal of Information and Organizational Sciences Authors: Harshvardhan Tiwari Subject(s): Computer and Information Science, Information Technology, Computer Science, Information Systems
FPGA Implementation of Key Exchange Algorithm Journal title: International Journal of engineering Research and Applications Authors: Vadde SeethaRama Rao, Krishna Bharat Battala Subject(s):
Knowledge, attitude and practices of 2nd year mbbs students on over the counter drugs Journal title: INTERNATIONAL JOURNAL OF CURRENT RESEARCH Authors: Ameya Puranik Ameya Puranik Subject(s):
Implementation and research of the algorithm of cryptographic protection of data with the public key based on the neural network Journal title: Вісник Житомирського державного технологічного університету. Серія: Технічні науки Authors: S.I. Bondarchuk, V.N. Kovalchuk, A.M. Kovalchuk, A.A. Yefimenko Subject(s):
Code based fuzzy extractor for biometric keys Journal title: КОМП’ЮТЕРНІ НАУКИ ТА КІБЕРБЕЗПЕКА Authors: Alexandr Kuznetsov, Anastasia Kiyan, Roman Serhiienko, Anna Uvarova, Dmytro Prokopovych-Tkachenko Subject(s):
Statistical properties of modern stream ciphers Journal title: КОМП’ЮТЕРНІ НАУКИ ТА КІБЕРБЕЗПЕКА Authors: Oleksii Nariezhnii, Egor Eremin, Vladislav Frolenko, Kyrylo Chernov, Tetiana Kuznetsova, Yevhen Deme... Subject(s):
HOMOMORPHIC ENCRYPTION OF CLOUD DATA BY THE MATRIX POLYNOMIAL METHOD Journal title: Сучасний стан наукових досліджень та технологій в промисловості Authors: Oleksandr Belej Subject(s):
Calculation of Parameters of Cryptic Curves Edwards over the Fields of 5th and 7th Characteristic Journal title: Кібербезпека: освіта, наука, техніка Authors: Anatoliy Bessalov Subject(s):
Analysis of probabilities of differentials for block cipher “Kalyna” (DSTU 7624:2014) Journal title: Восточно-Европейский журнал передовых технологий Authors: Victor Ruzhentsev, Valerii Sokurenko, Yuriy Ulyanchenko Subject(s):
ANALYSIS OF TECHNOLOGICAL INNOVATIONS IN A CRYPTOCURRENCY INTERNATIONAL PAYMENT SYSTEM Journal title: Інноваційна економіка Authors: Oleg Hennadiiovych Boiko Subject(s):
Performance Analysis of Security Mechanism for Automotive Controller Area Network Journal title: International Journal of Advanced Computer Science & Applications Authors: Mabrouka Gmiden, Mohamed Hedi Gmiden, Hafedh Trabelsi Subject(s):