Cryptanalysis of Tropical Encryption Scheme Based on Double Key Exchange
Abstract: A tropical encryption scheme is analyzed in this paper, which uses double key exchange protocol (KEP). The key exchange
Read MoreAbstract: A tropical encryption scheme is analyzed in this paper, which uses double key exchange protocol (KEP). The key exchange
Read MoreInsider threats are a growing phenomenon, but many businesses aren’t yet doing enough to protect themselves effectively. In Europe and
Read MoreAbstract: In this paper, the forward selection (FS) algorithm is introduced on the basis of information and communication technology, and
Read MoreBaselining your security by adopting a standard such as Cyber Essentials, Cyber Essentials Plus or the ISO 27001 standard can
Read MoreAbstract: Wireless sensor network (WSN) is the Internet of Things by a large number of sensors in the external physical
Read MoreIt cannot have escaped you that the word trustworthy has been added to the cybersecurity lexicon in recent years: trustworthy
Read MoreThis article is a result of me hearing this sentence uttered in a serious setting: ‘We do not need networking
Read MoreAbstract: This paper introduces a new Database Transposition, Substitution and XORing Algorithm (DTSXA) based on using chaotic maps. It is
Read MoreAR can help facility managers optimize, expand, maintain and secure data center infrastructure. As demand for data centers grows, IT
Read MoreDeepfakes present the possibility of future biometric security issues. They replicate real faces and voices to nearly identical degrees, which
Read More