يعرض 1 - 20 نتائج من 95 نتيجة بحث عن '"decrypt"', وقت الاستعلام: 0.74s تنقيح النتائج
  1. 1
  2. 2
    Academic Journal

    المصدر: Applied Mathematics and Nonlinear Sciences, Vol 9, Iss 1 (2024)

    مصطلحات موضوعية: frida, decrypt, mpaas, bonreeagent, 03b70, Mathematics, QA1-939

    وصف الملف: electronic resource

  3. 3
    Academic Journal
  4. 4
    Academic Journal
  5. 5
    Academic Journal
  6. 6
  7. 7
    Academic Journal
  8. 8
    Academic Journal

    المؤلفون: Mark Kenneth C. Engcot

    المصدر: International Journal of Recent Research in Mathematics Computer Science and Information Technology, 9(1), 28-33, (2022-08-08)

  9. 9
    Academic Journal

    المصدر: Journal of Soft Computing Exploration; Vol. 3 No. 1 (2022): March 2022; 37-43 ; 2746-0991 ; 2746-7686 ; 10.52465/joscex.v3i1

    مصطلحات موضوعية: Encrypt, Decrypt, Audio, Twofish, Cryptool

    وصف الملف: application/pdf

  10. 10
    Academic Journal

    المصدر: Sinkron : jurnal dan penelitian teknik informatika; Vol. 6 No. 1 (2021): Article Research Volume 6 Issue 1: January 2021; 243-247 ; 2541-2019 ; 2541-044X ; 10.33395/sinkron.v7i1

    مصطلحات موضوعية: Security, Base64, Encrypt, Decrypt, ASCII

    وصف الملف: application/pdf

  11. 11
    Academic Journal
  12. 12
    Academic Journal
  13. 13
    Academic Journal
  14. 14
    Academic Journal
  15. 15
    Academic Journal
  16. 16
    Academic Journal
  17. 17
    Academic Journal
  18. 18
    Academic Journal

    المؤلفون: Mohurle, Savita, Patil, Manisha

    المصدر: International Journal of Advanced Research in Computer Science; Vol 8, No 5 (2017): May-June 2017; 1938-1940 ; 0976-5697 ; 10.26483/ijarcs.v8i5

    مصطلحات موضوعية: Ransomware, Wannacry, encrypt, decrypt, preventive measures, threat, security

    وصف الملف: application/pdf

  19. 19
    Dissertation/ Thesis
  20. 20
    Academic Journal

    المصدر: Applied Mathematics & Information Sciences

    مصطلحات موضوعية: Authentication, key exchange, password, password guessing attacks, three-party encrypted key exchange. 1. Introduction In Internet, two communicating parties can communicate each other securely by using conventional symmetric-key cryptosystems such as the AES [19]. The two parties have a common session key to encrypt and decrypt their communicated messages by using symmetric-key cryptosystem. However, how do two parties securely obtain the common session key between them? This can be solved by using Diffie-Hellman key exchange protocol [7]. In 1992, Bellovin and Merritt firstly proposed an encrypted key exchange (EKE) family of key exchange protocols [2]. It is a password-based authentication and key agreement protocol. Two advantages of EKE are: (1) the communicating parties can use an easy-to-remember password to authenticate each other without being threatened by dictionary attacks [17], (2) the communicating parties can share a common session key to encrypt and decrypt confidential messages. In a large communication environment, EKE is unpractical because every two parties should share a password previously. If there are one thousand parties to communicate in this environment, each party should hold 999 passwords for EKE. Hence, an extension to EKE is proposed to enhance its practicality. The extension is called three-party encrypted key exchange protocol (3PEKE) in which a participant is allowed to share only one easy-toremember password with a trusted server such that two participants can negotiate a common session key to communicate with each other secretly [3, 10]. It can provide confidential communications between two participants over an insecure network. In 3PEKE, each party only holds himself/herself password. 1.1. Related Work Since the 3PEKE is based on password authentication, protecting the low-entropy password from guessing attacks is crucial for password-based authentication schemes [15, 23]. Ding and Horster introduced three possible types of guessing attacks as follows: (1) detectable on-line password guessing attacks, (2) undetectable on-line password guessing attacks, and (3) off-line password guessing attacks. Among the three classes, off-line password guessing attacks is the most critical ones [8]. The proposed 3PEKE ¤ Corresponding author: e-mail: ryanchen@lins.fju.edu.tw c° 2012 NSP Natural Sciences Publishing Cor.

    Time: 5

    وصف الملف: application/pdf