130,114 Hits in 6.3 sec

Encryption and Secure Computer Networks

Gerald J. Popek, Charles S. Kline
1979 ACM Computing Surveys  
There is increasing growth in the number of computer networks in use and in the kinds of distributed computing applications available on these networks This increase, together with concern about privacy  ...  about varmus network designs and who now wishes to consider incorporating encryption methods into these designs.  ...  11, No. 4, December 1979 Encryption and Secure Computer Networks • 339 in.  ... 
doi:10.1145/356789.356794 fatcat:oiwwzsa4zve4rbwihptjduer2u

Encryption Technology for Computer Network Data Security Protection

Yang Yu, C. Venkatesan
2022 Security and Communication Networks  
In order to solve the network security problem of data encryption technology, this paper proposes a research method of computer network information security maintenance based on data encryption technology  ...  Taking the network reporting system of a mining enterprise as the research object, this paper comprehensively expounds on the design of network reporting system and data encryption in network communication  ...  Nowadays, the protection of computer network security in various countries has become a serious social problem to curb computer crime.  ... 
doi:10.1155/2022/1789222 fatcat:g62y2af36zarvoairh6pow4kqa

Application of Data Encryption Technology in Computer Network Information Security

Lifeng Li, C. Venkatesan
2022 Security and Communication Networks  
In order to solve the partial optimization problems of the RSA algorithm in computer network security, a method of RSA algorithm optimization based on data encryption was proposed.  ...  It was proved that the method could effectively improve the budget efficiency of the RSA algorithm and solve the optimization problem of the RSA algorithm in computer network security.  ...  Introduction With the rapid development of computer network technology, computer network technology has been widely used in many fields of people's life.  ... 
doi:10.1155/2022/7472205 fatcat:tm7owepr55ejlh7d2wl7rgpfni

Enhanced Security in Cloud Computing Using Neural Network and Encryption

Muhammad Usman Sana, Zhanli Li, Fawad Javaid, Hannan Bin Liaqat, Muhammad Usman Ali
2021 IEEE Access  
To address this problem, we propose a new security design using Artificial Neural Networks (ANN) and encryption to confirm a safe communication system in the cloud environment, by letting the third parties  ...  Cloud computing has lots of features, e.g. virtualization, multi-user, efficiency, cost savings, and most importantly security.  ...  Among these approaches, numerous encryption techniques are starting to grow rapidly, including HE that secures multi-terminal computing, and gap privacy.  ... 
doi:10.1109/access.2021.3122938 fatcat:jpnki543zncbnij37pivanhbvi

Construction for Searchable Encryption with Strong Security Guarantees

István Vajda
2019 International Journal of Computer Network and Information Security  
We present a construction for searchable symmetric encryption (SSE). We consider a wide range of attacks and hardness assumptions and fulfill the strongest security requirements.  ...  Our construction is secure in the standard model of computation assuming bilinear groups with the widely used Symmetric eXternal Diffie Hellmann (SXDH) assumption.  ...  Computer Network and Information Security, 2019, 5, 1-10 Our construction gives security by message indistinguishability under adaptive encrypted keywords attack (IND-CKA) and adaptive trapdoor key attack  ... 
doi:10.5815/ijcnis.2019.05.01 fatcat:s74ai52jfjct3d6g4bwaokr6ly

Computer Network Security Management of Data Encryption Technology

Caiping Sun, Weijiang Wang, Mohammad Farukh Hashmi
2022 Wireless Communications and Mobile Computing  
Mass data and information can be transmitted and exchanged online through the network.  ...  With the continuous promotion of high and new technologies such as computers and big data, humans enter a new period-information age.  ...  This is actually the core technical problem of computer security, to provide higher security for the data of the computer network.  ... 
doi:10.1155/2022/6873087 fatcat:o25bf45cufhkzkkkzeomu2lg7e

Application of Information Encryption Technology in Computer Network Communication Security

Hongbo Zhang, Balakrishnan Nagaraj
2022 Wireless Communications and Mobile Computing  
information data encryption and decryption processing based on data encryption technology, and computer secondary communication key update.  ...  In order to improve the communication efficiency while ensuring the security of communication information, this paper proposes a design and research method of a computer information security communication  ...  In this context, the computer has derived the data encryption technology to ensure the security of computer network communication and protect people's privacy.  ... 
doi:10.1155/2022/9354441 fatcat:fiadjlvhnffofhb4hifvcqckk4

Analysis of Data Encryption Algorithms for Telecommunication Network-Computer Network Communication Security

Yifeng He, Nan Ye, Rui Zhang, Zhihan Lv
2021 Wireless Communications and Mobile Computing  
Starting from the computer network communication security data encryption algorithm, we discuss the effects of several different encryption methods on improving network security.  ...  From the perspective of network data link, there are three methods of encryption algorithm, namely, link encryption algorithm, node encryption algorithm, and end-to-end encryption algorithm.  ...  Contrast Analysis and Analysis of the Security Performance of Data Encryption Algorithms for Computer Network Communication Security.  ... 
doi:10.1155/2021/2295130 fatcat:bpu2v7st6zgnrbexarauelhhgy

DNA-Genetic Encryption Technique

Hamdy M. Mousa
2016 International Journal of Computer Network and Information Security  
In this paper, we propose DNA-Genetic Encryption Technique (D-GET) in order to make the technique more secure and less predictable.  ...  This Technique also transforms the text into an image and vice versa to improve security and multiple key sequences to increase the degree of diffusion and confusion, which makes resulting cipher data  ...  Computer Network and Information Security, 2016, 7, 1-9 attacks based on the multi-operations, encrypted keys, genetic operations and multi-rounds.  ... 
doi:10.5815/ijcnis.2016.07.01 fatcat:ib6kaai36vaotgdcblg2xwqziy

Double Layer Image Security System using Encryption and Steganography

Samreen Sekhon Brar, Ajitpal Brar
2016 International Journal of Computer Network and Information Security  
Blowfish encryption algorithm would be used for the encryption purposes. It offers maximum throughput (faster) and also energy efficient.  ...  Compressed image would be encrypted to enhance the image security. Real image will be hidden into another image. A cluster based steganographic technique will be used.  ...  Elapsed Time between Proposed and Existing System Copyright © 2016 MECS I.J. Computer Network and Information Security, 2016, 3, 27-33 Fig.2.  ... 
doi:10.5815/ijcnis.2016.03.04 fatcat:cqtame4x3jhdfcbspa44iaua4m

Securing Patient Privacy in E-Health Cloud Using Homomorphic Encryption and Access Control

2014 International journal of computer networks and communications security  
However, they also bear new risks and raise challenges with respect to security and privacy aspects. Ensuring the security and privacy is a major factor in the cloud computing environment.  ...  This proposed system ensure the security of electronic health records stored in the cloud using Homomorphic Encryption to secure patients medical records and Bilayer Access Control to gives access right  ...  A Health Cloud model which is based on Cloud Computing and wireless sensor networks (WSN) concept were proposed by [5] and they also proposed to have the security mechanism inside the cloud to guarantee  ... 
doi:10.47277/ijcncs/2(1)3 fatcat:qhodtniatnbh3kvipp5fuqk2ky

Chaotic Genetic-fuzzy Encryption Technique

Hamdy M. Mousa
2018 International Journal of Computer Network and Information Security  
Technique(C-GET) in order to enhance secured encryption technique and less predictable.  ...  As the result of increasing use of internet in daily communication and the importance of information security during data storage and transmission process, we propose iterative Chaotic Genetic-fuzzy Encryption  ...  Computer Network and Information Security, 2018, 4, 10-19 Fig.8.  ... 
doi:10.5815/ijcnis.2018.04.02 fatcat:3ayr4npc3nfgveyqauf5fo3e3y

Order-Revealing Encryption Scheme with Comparison Token for Cloud Computing

Jingjing Guo, Jiacong Sun
2020 Security and Communication Networks  
Therefore, it is desirable to design an efficient ORE scheme which addresses above efficiency and security issues.  ...  Furthermore, we illustrate a secure range query scheme through designing an encrypted tree structure named PORE tree from the above ORE scheme.  ...  ALGORITHM 1: Secure BF. Security and Communication Networks Proof.  ... 
doi:10.1155/2020/8837904 doaj:06ed6a225df34fe7be60f2f3b59f27f6 fatcat:e5l35dexn5a7rl47pfvjyrojse

Image Encryption Using Parallel RSA Algorithm on CUDA

2013 International journal of computer networks and communications security  
In this paper we discuss Image Encryption and Decryption using RSA Algorithm which was earlier used for text encryption.  ...  We intend to build a general RSA algorithm which can be combined with other image processing techniques to provide new methodologies and better encryption decryption efficiency.  ...  This methodology helps in better and secure transfer of data.  ... 
doi:10.47277/ijcncs/2(7)3 fatcat:b6lgnmczvbh5pjw72346mxf7bi

Performance Evaluation of Security-Throughput Tradeoff with Channel Adaptive Encryption

Poonam Jindal, Brahmjit Singh
2013 International Journal of Computer Network and Information Security  
In this paper, a Link Adaptive Encryption scheme is evaluated that adapts to channel variations and enhances the security level of WLANs without making any compromise with the network performance.  ...  Therefore, security for data transmission over wireless channel results in throughput loss. Tradeoff between security and throughput is always a major concern in wireless networks.  ...  Computer Network and Information Security, 2013, 1, 49-55 in CBC mode of cipher.  ... 
doi:10.5815/ijcnis.2013.01.06 fatcat:kqtlvclqdnbw5ab6a7i6tnftwq
« Previous Showing results 1 — 15 out of 130,114 results