The performance of the 3DES and Fernet encryption in securing data files
The number of cyber attacks launched has increased five-fold since the advent of the Coronavirus Disease Pandemic (COVID-19) in 2019. Ransomware is currently one of the highest digital risks as it aids cybercriminals to use persistent threat tools and techniques to get access to targeted networks by...
| Main Authors: | Mohd, Siti Munirah, Kamarudin, Shafinah, Yahya, Norhanizah, Hasan, Sazlinah, Mahamad Zakaria, Muhammad Luqman, Sulaiman, Sahimel Azwal, Setyohadi, Djoko Budiyanto |
|---|---|
| Format: | Article |
| Published: |
Little Lion Scientific
2024
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/106157/ |
Similar Items
The performance of the 3DES and fernet encryption in securing data files
by: Siti Munirah, Mohd, et al.
Published: (2024)
by: Siti Munirah, Mohd, et al.
Published: (2024)
Data Encryption Standard (DES)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
File encryption by iris recognition system
by: Musab A. M. Ali,, et al.
Published: (2024)
by: Musab A. M. Ali,, et al.
Published: (2024)
Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm
by: Lim, Mui Liang
Published: (2006)
by: Lim, Mui Liang
Published: (2006)
Implementation of pipelined data encryption standard (DES) using altera CPLD
by: Teo, Pock Chueng, et al.
Published: (2000)
by: Teo, Pock Chueng, et al.
Published: (2000)
File integrity monitor scheduling based on file security level classification
by: Abdullah, Zul Hilmi, et al.
Published: (2011)
by: Abdullah, Zul Hilmi, et al.
Published: (2011)
On the security defects of an image encryption scheme
by: C., Li, et al.
Published: (2009)
by: C., Li, et al.
Published: (2009)
Encryption method for SCADA security enhancement
by: Shahzad, Aamir, et al.
Published: (2014)
by: Shahzad, Aamir, et al.
Published: (2014)
Security Study and Encryption / Decryption Method
by: Al-Qdah, Majdi Taysir
Published: (2000)
by: Al-Qdah, Majdi Taysir
Published: (2000)
IoT data encryption algorithm for security
by: Kanaan Ismael, Marwan
Published: (2020)
by: Kanaan Ismael, Marwan
Published: (2020)
Chaotic asymmetric encryption process for data security.
by: Kamel Arrifin, Muhammad Rezal, et al.
Published: (2008)
by: Kamel Arrifin, Muhammad Rezal, et al.
Published: (2008)
Enhancing cloud data security using hybrid of advanced encryption standard and Blowfish encryption algorithms
by: -, Salma, et al.
Published: (2019)
by: -, Salma, et al.
Published: (2019)
Industrial training briefing for Bachelor of applied science in data analytics with honors
by: Sahimel Azwal, Sulaiman
Published: (2023)
by: Sahimel Azwal, Sulaiman
Published: (2023)
Compatible pairs of actions for finite cyclic 2-groups and the associated compatible action graphs
by: Sahimel Azwal, Sulaiman
Published: (2018)
by: Sahimel Azwal, Sulaiman
Published: (2018)
Bootcamp Careers 2024 - PSM feat. TalentCorp
by: Sahimel Azwal, Sulaiman
Published: (2024)
by: Sahimel Azwal, Sulaiman
Published: (2024)
Secure text transfer via bluetooth using hybrid encryption
by: Fakhrul Hakimi, Saidi
Published: (2012)
by: Fakhrul Hakimi, Saidi
Published: (2012)
A proposed CCA-secure encryption on an ElGamal variant
by: Asbullah, Muhammad Asyraf, et al.
Published: (2012)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2012)
New system for secure cover file of hidden data in the image page within executable file using statistical Steganography Techniques
by: Islam, Md. Rafiqul, et al.
Published: (2009)
by: Islam, Md. Rafiqul, et al.
Published: (2009)
Novel framework for hidden data in the image page within
executable file using computation between advanced encryption standard and distortion techniques
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
Digital filing and file control system (DFFCS)
by: Teh, Suet Khim
Published: (2005)
by: Teh, Suet Khim
Published: (2005)
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
Wireless physical layer security using encryption and channel pre-compensation
by: Tahir, Mohammad, et al.
Published: (2010)
by: Tahir, Mohammad, et al.
Published: (2010)
Pairing-based public-key encryption schemes with backward-and-forward security
by: Han, Song, et al.
Published: (2008)
by: Han, Song, et al.
Published: (2008)
Network Security Encryption Techniques for Reliablility Data Transmission on Password System
by: Norrozila, Sulaiman, et al.
Published: (2013)
by: Norrozila, Sulaiman, et al.
Published: (2013)
The block cipher algorithm–properties, encryption efficiency analysis and security evaluation
by: Rezaeipour, Davood, et al.
Published: (2010)
by: Rezaeipour, Davood, et al.
Published: (2010)
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
by: H. Belgassem, Seddeq
Published: (2004)
by: H. Belgassem, Seddeq
Published: (2004)
Investigation of data encryption algorithm for secured transmission of electrocardiograph (ECG) signal
by: Shaikh, Muhammad Umair, et al.
Published: (2018)
by: Shaikh, Muhammad Umair, et al.
Published: (2018)
Secured electrocardiograph (ECG) signal using fully homomorphic encryption technique
by: Shaikh, Muhammad Umair, et al.
Published: (2020)
by: Shaikh, Muhammad Umair, et al.
Published: (2020)
Towards a dynamic file integrity monitor through a security classification
by: Abdullah, Zul Hilmi, et al.
Published: (2011)
by: Abdullah, Zul Hilmi, et al.
Published: (2011)
Testing file
by: Ilina, Musa
Published: (2014)
by: Ilina, Musa
Published: (2014)
Corrupt File
by: Cinanni, Gina
Published: (2013)
by: Cinanni, Gina
Published: (2013)
Securing medical data transmission systems based on integrating algorithm of encryption and steganography
by: Hashim, Mohammed Mahdi, et al.
Published: (2020)
by: Hashim, Mohammed Mahdi, et al.
Published: (2020)
A new secure storing system for biometric templates based encryption and concealment
by: Khalaf, Emad Taha, et al.
Published: (2015)
by: Khalaf, Emad Taha, et al.
Published: (2015)
Security in robot operating system (ROS) by using Advanced Encryption Standard (AES)
by: Nor Alia Syuhada, Shaharudin
Published: (2018)
by: Nor Alia Syuhada, Shaharudin
Published: (2018)
Improve cloud computing security using RSA encryption with Fermat's little theorem
by: Mohamed Shereek, Balkees, et al.
Published: (2014)
by: Mohamed Shereek, Balkees, et al.
Published: (2014)
Securing the image through the combination of elliptic curve cryptosystem and hill cipher encryption
by: Sulaiman, Saniah
Published: (2019)
by: Sulaiman, Saniah
Published: (2019)
Improving the security and encryption performance of cloud storage by using elliptic curve cryptography
by: Ismaeel, Nooruldeen Qutaiba
Published: (2016)
by: Ismaeel, Nooruldeen Qutaiba
Published: (2016)
Video encryption using computation between H.264/AVC and AES encryption algorithm
by: Omar zakaria, Mohamed Abomhara, et al.
Published: (2011)
by: Omar zakaria, Mohamed Abomhara, et al.
Published: (2011)
Enhancing selective encryption for H.264/AVC using advanced encryption standard
by: Abomhara, Mohamed, et al.
Published: (2010)
by: Abomhara, Mohamed, et al.
Published: (2010)
Securing cover-file without limitation of hidden data size using computation between cryptography and steganography
by: Zaidan , A. A., et al.
Published: (2009)
by: Zaidan , A. A., et al.
Published: (2009)
Similar Items
-
The performance of the 3DES and fernet encryption in securing data files
by: Siti Munirah, Mohd, et al.
Published: (2024) -
Data Encryption Standard (DES)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011) -
File encryption by iris recognition system
by: Musab A. M. Ali,, et al.
Published: (2024) -
Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm
by: Lim, Mui Liang
Published: (2006) -
Implementation of pipelined data encryption standard (DES) using altera CPLD
by: Teo, Pock Chueng, et al.
Published: (2000)