Abstract: This research article identifies the fault occurrence in the blowfish cryptography algorithm using a modified Decision Tree classifier. Though there are several cryptography algorithms, the ...
ABSTRACT: Today’s Internet of Things (IoT) application domains are widely distributed, which exposes them to several security risks and assaults, especially when data is being transferred between ...
ABSTRACT: In recent years, technological advancements have provided the world with cloud computing which can transfer, store, and process huge data chunks in the form of video, audio, images, and text ...
Mr. Murphy is the junior senator from Connecticut. Kids are even more in the bag of social media companies than we think. So many of them have ceded their online autonomy so fully to their phones that ...
Add a description, image, and links to the blowfish-algorithm topic page so that developers can more easily learn about it.
Abstract: Image security becomes important topic because of increasing image usage in communication besides assures information security which is unseen in these images such as military and medical ...
If you find this useful then please consider helping me out (I'm jobless and sick). For more information visit my GitHub profile. For now I've decided to share this project as it is; which could mean ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results