Results (5)
Search Parameters:
Keyword: EncryptionDevice Authentication using Homomorphic Encryption
by Supriya Yadav and Gareth Howells
Journal of Engineering Research and Sciences, Volume 2, Issue 10, Page # 1-8, 2023; DOI: 10.55708/js0210001
Abstract: In the digital era, data security in files, databases, accounts, and networks is of utmost importance. Due to the sensitive, private, or protected information they contain, databases are a common target for cyber attacks. To assess threats to data and lower the risk involved with data processing and storage, data security is crucial. Therefore, it… Read More
(This article belongs to the Special Issue on Special Issue on Multidisciplinary Sciences and Advanced Technology (SI-MSAT 2023) and the Section Software Engineering – Computer Science (SEC))
Histogram Based Visible Image Encryption for Real Time Applications
by Kiran, Sunil Kumar D S, Bharath K N, Harshitha Rohith, Sharath Kumar A J and Ganesh Kumar M T
Journal of Engineering Research and Sciences, Volume 1, Issue 7, Page # 1-6, 2022; DOI: 10.55708/js0107001
Abstract: Like most patient information, medical imaging data is subject to strict data protection and confidentiality requirements. This raises the issue of sending the data which contains a medical image on an open network as per the above issue, also there might be a leakage of information. Encrypting an Image and hiding the information in it… Read More
(This article belongs to the Section Cybernetics – Computer Science (CYC))
Secure Anonymous Acknowledgments in a Delay-Tolerant Network
by Edoardo Biagioni
Journal of Engineering Research and Sciences, Volume 3, Issue 11, Page # 24-30, 2024; DOI: 10.55708/js0311002
Abstract: TCP and many other protocols use acknowledgments to provide reliable transmission of data over unreliable media. Secure acknowledgments offer a cryptographic guarantee that valid acknowledgments for a given message can only be issued by the intended receiver. In the context of an ad-hoc network, anonymous acknowledgments make it hard for an attacker to determine which… Read More
(This article belongs to the Special Issue on Special Issue on Multidisciplinary Sciences and Advanced Technology (SI-MSAT 2024) and the Section Cybernetics – Computer Science (CYC))
Applied Salt Technique to Secure Steganographic Algorithm
by Bo Bo Oo
Journal of Engineering Research and Sciences, Volume 2, Issue 2, Page # 8-14, 2023; DOI: 10.55708/js0202002
Abstract: Digital multimedia assets, including photographs, movies, and audio files, have become a staple of contemporary life. Steganography is a method for undetectable information concealment in these files. One can communicate messages to another by modifying multimedia signals so that a human would be unable to tell the difference between the original signal and the altered… Read More
(This article belongs to the Special Issue on Special Issue on Computing, Engineering and Sciences (SI-CES 2022-23) and the Section Information Systems – Computer Science (ISC))
Blockchain Based Framework for Securing Students’ Records
by Omega Sarjiyus and Israel Isaiah
Journal of Engineering Research and Sciences, Volume 1, Issue 6, Page # 45-54, 2022; DOI: 10.55708/js0106006
Abstract: Right now, colleges, as focuses of exploration and development, coordinate in their cycles different advances that permit further developing administrations and cycles for their individuals. Among the inventive innovations is the Web of Things that permits getting information from the climate and individuals through various gadgets. Security of information on college grounds is expected to… Read More
(This article belongs to the Section Cybernetics – Computer Science (CYC))