Search Results - "cryptography"
-
1
Chaos Based Cryptography An Alternative to Algebraic Cryptography
Published 2008“…We will discuss the earliest form of cryptography before fast forwarding to the current modem forms of cryptography. …”
Get full text
Get full text
-
2
Communications cryptography
Published 2004“…This paper focuses on the analysis of the two types of key cryptography exists, based on the availability of the key publicly: Private key Cryptography, and Public Key Cryptography. …”
Get full text
Get full text
-
3
-
4
-
5
Cryptography as a Service (CaaS): Quantum cryptography for secure cloud computing
Published 2017“…However, this paper proposes as integrated service of Advanced Quantum Cryptography with Cloud Computing. To ensure the secure Cloud Environment between sender and receiver, Quantum Cryptography proposes the use of photons and physics to generate cryptographic keys.…”
Get full text
Get full text
-
6
Basics of security and cryptography
Published 2014“…To begin with, the purpose of this book is not to delve into the history of cryptography or to analyze the debate on the first occurrence of the technique in communications technologies. …”
Get full text
Get full text
Get full text
Get full text
-
7
-
8
-
9
Implementing cryptography in database
Published 2010“…This system is developed using Java programming language with the use of Java Cryptography Extension for the cryptography process. …”
Get full text
Get full text
-
10
-
11
-
12
Use of Cryptography in Cloud Computing
Published 2013“…Therefore, in this paper different cryptography aspects that pose a threat to cloud computing are reviewed. …”
Get full text
Get full text
-
13
Extention and cryptanalysis of golden cryptography
Published 2015Subjects: Get full text
Get full text
-
14
Number theoretical foundations in cryptography
Published 2016“…In recent times the hazards in relationships among entities in different establishments worldwide have generated exciting developments in cryptography. Central to this is the theory of numbers. …”
Get full text
Get full text
-
15
-
16
-
17
-
18
A survey on elliptic curve cryptography
Published 2014“…Cryptography is an evolving field that research into discreet mathematical equation that is representable by computer algorithm for providing message condentiality. …”
Get full text
Get full text
-
19
-
20
Practical cryptography: algorithms and implementations using C++
Published 2014“…Many books are available on the subject of cryptography. Most of these books focus on only the theoretical aspects of cryptography. …”
Get full text
Get full text
Get full text