Minimizing the Effect of Brute Force Attack using Hybridization of Encryption Algorithms
暂无分享,去创建一个
[1] Sanjay Kumar,et al. Ensuring data storage security in cloud computing based on hybrid encryption schemes , 2016, 2016 Fourth International Conference on Parallel, Distributed and Grid Computing (PDGC).
[2] M. Hemalatha,et al. A design of security protocol using hybrid encryption technique (AES-Rijndael and RSA) , 2009 .
[3] Khushdeep Kaur,et al. Hybrid Algorithm with DSA , RSA and MD 5 Encryption Algorithm for wireless devices , 2012 .
[4] Prakash Kuppuswamy,et al. Hybrid encryption/decryption technique using new public key and symmetric key algorithm , 2014, Int. J. Inf. Comput. Secur..
[5] Neha,et al. Enhanced Security using Hybrid Encryption Algorithm , 2016 .
[6] Jidong Jin,et al. Research for the application and safety of MD5 algorithm in password authentication , 2012, 2012 9th International Conference on Fuzzy Systems and Knowledge Discovery.
[7] nbspGaurav R. Patel,et al. Hybrid Encryption Algorithm , 2014 .
[8] Hybrid Encryption System , 2014 .
[9] Muhammad Sharif,et al. A Survey of Password Attacks and Comparative Analysis on Methods for Secure Authentication , 2012 .
[10] Priya Pise,et al. Hybrid Encryption Techniques for Secure Sharing of a Sensitive Data for Banking Systems Over Cloud , 2018, 2018 International Conference On Advances in Communication and Computing Technology (ICACCT).
[11] M. Shaar,et al. A hybrid hiding encryption algorithm (HHEA) for data communication security , 2003, 2003 46th Midwest Symposium on Circuits and Systems.
[12] Young Lee,et al. Hybrid Encryption for Securing SharedPreferences of Android Applications , 2018, 2018 1st International Conference on Data Intelligence and Security (ICDIS).
[13] P. Deepalakshmi,et al. Design of Secure Storage for Health-care Cloud using Hybrid Cryptography , 2018, 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT).
[14] Tai-hoon Kim,et al. Secure E-Commerce Model using Hybrid Encryption for Financial Transactions , 2017 .
[15] Parvinder Singh,et al. A New Way to Design and Implementation of Hybrid Crypto System for Security of the Information in Public Network , 2013 .
[16] Abeer Alsadoon,et al. A hybrid encryption model for secure cloud computing , 2015, 2015 13th International Conference on ICT and Knowledge Engineering (ICT & Knowledge Engineering 2015).
[17] Anurag Jain,et al. Analysis of brute force attack using TG — Dataset , 2015, 2015 SAI Intelligent Systems Conference (IntelliSys).