Skip to main content
    • by 
    • Cryptography
In recent years, media has become ubiquitous and important for networking and content sharing. Interest in the impact of media on the “real world” is as old as media itself. At the dawn of a new era, vast expansion in the advancement of... more
    • by 
    •   9  
      Operating SystemsComputer EngineeringDatabase SystemsComputer Networks
This book is 260 pages long and I include a table of organization of the US military intelligence and the OSS and its behind the lines commando operations. I focus some on the developing of US signals intelligence and military history... more
    • by 
    •   15  
      Military HistoryFascismFBI HistoryCapitalism
The COVID-19 pandemic has pushed digitalization and digitization across all industry sectors and blockchain is considered an innovative frontrunning technology with regards to applicability and usability in these challenging times.... more
    • by 
    •   15  
      FinanceDevelopment EconomicsCryptographyDigital Asset Management
Most computer systems are currently being integrated into networks. The purpose of integrating a computer system into a network is to make it more effective and easy to access. Various data and information are usually stored within a file... more
    • by 
    •   4  
      CryptographyEncryptionFile SecurityPretty Good Privacy
    • by 
    •   20  
      OpticsBiomedical EngineeringPhotochemistryComputer Security
SNOW 3G is a synchronous, word-oriented stream cipher used by the 3GPP standards as a confidentiality and integrity algorithms. It is used as first set in long term evolution (LTE) and as a second set in universal mobile... more
    • by 
    •   6  
      FPGACryptographyVhdlWireless Network Security
Resumen-El criterio estricto de avalancha (SAC) es una de las propiedades deseables en las funciones para ser utilizadas con fines criptográficos. En este trabajo se expone una aplicación de este criterio para evaluar la difusión presente... more
    • by 
    • Cryptography
    • by 
    •   3  
      Information SecurityComputer SecurityCryptography
The new information technology is becoming an important factor in the future development of financial services industry, and especially banking industry. Growing international trading and problems in transferring money have motivated... more
    • by 
    •   7  
      Information SystemsInformation SecuritySecurityComputer Security
In this paper an analysis of the existing video information protection methods is made. Analysis of current H.323 protocol stack has been made. A new encryption/decryption layer has been suggested. An approach for partial data encryption... more
    • by 
    •   6  
      Computer ScienceInformation TechnologyVideoCryptography
    • by 
    •   9  
      Operating SystemsCryptographyConsumerFlood
Now a day’s Steganography plays an important role in defence, public sectors works and internet. Cryptography created as a technique for securing the secrecy of communication and many different methods have been developed to encrypt,... more
    • by 
    •   2  
      CryptographyStego Image
    • by 
    •   16  
      Distributed ComputingResilienceWireless Sensor NetworksCryptography
    • by 
    •   3  
      CryptographyDocumentsRákóczi's War of Independence in Hungary (1703-1711)
    • by 
    •   22  
      Information RetrievalPrivacyCryptographyDistributed System
    • by 
    •   7  
      DoS AttackCryptographyProtocolsInternet
    • by 
    •   16  
      Information SystemsComputer ScienceInformation TechnologyInformatics
    • by 
    •   3  
      Information SecurityComputer SecurityCryptography
    • by 
    •   4  
      MathematicsCryptographyLinear AlgebraComputer Control
    • by 
    •   6  
      Computer ScienceCryptographyMultiplierEncoding
They are susceptible to a variety of attacks, including node capture, physical tampering, and denial of service, while prompting a range of fundamental research challenges.
    • by 
    •   17  
      Distributed ComputingPhysicsSecurityWireless Sensor Networks
    • by 
    •   16  
      Information SecuritySoftware SecuritySoftware DevelopmentSix Sigma
    • by 
    •   5  
      Computer SecurityCryptographySecret SharingCovert Channel
Blockchain " Is a decentralized database that stores a registry of assets and transactions across a peer-to-peer network. Is basically a public registry of who owns what and who transacts what. The transactions are secured by... more
    • by 
    •   2  
      AccountingCryptography
    • by 
    •   16  
      UsabilityService Oriented ArchitectureWeb ServicesSecurity in Web Services
    • by 
    •   6  
      Information SystemsComputer NetworksCircuits and SystemsCryptography
With the technological advancement in body area sensor networks (BASNs), low cost high quality electrocardiographic (ECG) diagnosis systems have become important equipment for healthcare service providers. However, energy consumption and... more
    • by 
    •   20  
      AlgorithmsBiomedical EngineeringData CompressionComputer Security
    • by 
    •   3  
      Wireless Sensor NetworksCryptographyGenetic Algorithm
    • by 
    •   13  
      Information SystemsElectrical EngineeringComputer ScienceInformation Technology
    • by 
    •   2  
      DramaCryptography
    • by 
    •   20  
      AgronomyImage ProcessingInformation SecurityMachine Learning
    • by 
    •   20  
      Computer ScienceDistributed ComputingComputer NetworksSystem Management
Abstract— With the continuous development of the wireless technology, securing wireless sensor networks became more and more a crucial but also a demanding task. In this paper we propose a combined strategy that is meant to discover... more
    • by 
    •   12  
      Computer ScienceInformaticsInformation SecurityWireless Sensor Networks
    • by 
    •   15  
      PolymorphismTime UseComputer SecurityCryptography
    • by 
    •   18  
      OpticsTechnologyQuantum OpticsSpectroscopy
    • by 
    •   5  
      CryptographyEncryptionCryptanalysisText
In cryptography, a hybrid cryptosystem is one which combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem. Public-key cryptosystems are convenient in that they do not require the sender... more
    • by 
    •   2  
      Hybrid SystemsCryptography
    • by 
    •   9  
      Information SystemsComputer ScienceInformation TechnologyInformation Security
Network security refers to any activities designed to protect the network, which includes the authorization of information access in a network, which is controlled by the network administrator. Network security has turned out to be more... more
    • by 
    •   4  
      Computer ScienceInformation SecurityComputer SecurityCryptography
    • by 
    •   12  
      PrivacyDigital SignatureInternet BankingCryptography
    • by 
    •   16  
      Computer ArchitectureFPGACryptographyField-Programmable Gate Arrays
    • by 
    •   12  
      Social PsychologyInformation RetrievalData AnalysisConfidence
During the last decades, Steganography has found many applications. Many steganographic systems have been developed and used in various areas, e.g., in digital assets (DRM), Telecommunications, Medicine etc. In this paper, we prove that... more
    • by 
    •   17  
      Number TheoryImage ProcessingInformaticsTelecommunications
    • by 
    •   7  
      Computer ScienceCryptographyImage recognitionSmart Card
Power Control in Mobile Ad Hoc networks is a critical issue, since nodes are powered by batteries.The main idea of power control schemes is to use different power levels for RTS/CTS and DATA/ACK. These schemes may degrade network... more
    • by 
    •   11  
      Social NetworksMobile Ad Hoc NetworksWireless CommunicationsSocial Networking
    • by 
    •   9  
      Computer ScienceCryptographyRouting protocolsAd Hoc Networks
In the 21st century, we have plenty of data available in the society of education. Importantly, today's education system has changed, it takes place through all the available channels and one of the significant means is the digital... more
    • by 
    •   8  
      Information SecurityE-learningComputer SecurityCryptography
    • by 
    •   11  
      Information TechnologyInformation SecurityWireless CommunicationsComputer Networks