PDF Archive

Easily share your PDF documents with your contacts, on the Web and Social Networks.

Share a file Manage my documents Convert Recover PDF Search Help Contact


Search


PDF Archive search engine
Last database update: 07 August at 14:38 - Around 220000 files indexed.

Show results per page

Results for «encryption»:


Total: 700 results - 0.042 seconds

DEVRY COMP 122 Lab 7 Lab Report and Source Code 100%

You are to design and implement a program which does encryption and decryption of data from files.

https://www.pdf-archive.com/2017/02/28/devry-comp-122-lab-7-lab-report-and-source-code/

28/02/2017 www.pdf-archive.com

DEVRY COMP 122 Lab 7 Lab Report and Source Code 99%

You are to design and implement a program which does encryption and decryption of data from files.

https://www.pdf-archive.com/2017/03/03/devry-comp-122-lab-7-lab-report-and-source-code/

03/03/2017 www.pdf-archive.com

Encryption Software Market 99%

Executive Summary (1/2) Knowledge Based Value (KBV) Research Global Encryption Software Market Full report:

https://www.pdf-archive.com/2017/09/19/encryption-software-market/

19/09/2017 www.pdf-archive.com

24I20-IJAET0520915 v7 iss2 495-499 99%

22311963 A COMPREHENSIVE STUDY OF TIME COMPLEXITY OF VARIOUS ENCRYPTION ALGORITHMS Vikendra Singh1, Harsh Dhiman2, Manisha Khatkar3, Nida4 1 Amity School of Engineering and Technology, Amity University, Noida , India School of Computing Science and Engineering, Galgotias University, Greater Noida, India 3 Amity School of Engineering and Technology, Amity University, Noida, India 4 School of Computing Science and Engineering, Galgotias University, Greater Noida, India 2 ABSTRACT As the technology is going to increase, security issues are also going to increase.

https://www.pdf-archive.com/2014/07/04/24i20-ijaet0520915-v7-iss2-495-499/

04/07/2014 www.pdf-archive.com

21I16-IJAET0916935 v6 iss4 1632to1638 99%

22311963 OPTIMIZED PERCEPTUAL VIDEO ENCRYPTION USING PERMUTATION APPROACH Tisa Sonny1, Lisha G Pillai2, Parameshachari B D3,a, Muruganantham C2, and H S Divakara Murthy4 1 M.Tech Student, 2Assistant Professor, 3Associate Professor, 4Dean and HOD Department of ECE, Nehru College of Engineering and Research Centre, Pampady, Thiruvilawamala, Kerala, India.

https://www.pdf-archive.com/2014/07/04/21i16-ijaet0916935-v6-iss4-1632to1638/

04/07/2014 www.pdf-archive.com

26N13-IJAET0313522 revised 99%

2231-1963 SECURE PARTIAL IMAGE ENCRYPTION SCHEME USING SCAN BASED ALGORITHM Parameshachari B D1, K.

https://www.pdf-archive.com/2013/05/13/26n13-ijaet0313522-revised/

13/05/2013 www.pdf-archive.com

IJETR2217 98%

2321-0869 (O) 2454-4698 (P) Volume-7, Issue-5, May 2017 Survey and Analysis of Data Encryption Methods and Development of A Security Model to Encrypt/Decrypt Messages Dr.

https://www.pdf-archive.com/2017/09/09/ijetr2217/

09/09/2017 www.pdf-archive.com

Aarkstore - Global Encryption Software Market 98%

Global Encryption Software Market (Usage, Vertical and Geography) - Size, Share, Global Trends, Company Profiles, Demand, Insights, Analysis, Research, Report, Opportunities, Segmentation and Forecast, 2013 - 2020 Aarkstore - Global Encryption Software Market Software-based encryption is one of the fast emerging end point data security solutions.

https://www.pdf-archive.com/2015/03/09/aarkstore-global-encryption-software-market/

09/03/2015 www.pdf-archive.com

SSH Session Structure 98%

3 Symmetric Encryption .............................................................................................................................. 3 Asymmetric Encryption ............................................................................................................................

https://www.pdf-archive.com/2018/02/05/ssh-session-structure/

05/02/2018 www.pdf-archive.com

Encryption Software Market (1).PDF 98%

Encryption Software Market – Forecasts from 2017 to 2022 DESCRIPTION Global Encryption Software market is projected to grow at a CAGR of 17.93% during the forecast period to grow to US$6.782 billion by 2022, increasing from US$2.974 billion in 2017.

https://www.pdf-archive.com/2017/07/11/encryption-software-market-1/

11/07/2017 www.pdf-archive.com

Assignment4-CryptoFS-SP17 97%

This file system will encrypt on a per-file basis, in contrast to what is commonly known as full-disk encryption.

https://www.pdf-archive.com/2017/06/03/assignment4-cryptofs-sp17/

03/06/2017 www.pdf-archive.com

BasicCryptologyEncryptionNotLikeTodayCryptoCurrency 97%

Caesar's Method Caesar's encryption method is one of the oldest encryption methods known to humanity.

https://www.pdf-archive.com/2018/05/21/basiccryptologyencryptionnotliketodaycryptocurrency/

21/05/2018 www.pdf-archive.com

Mobile Encryption Market 97%

Mobile Encryption Market share research by applications and regions for 2017-2024:

https://www.pdf-archive.com/2017/08/22/mobile-encryption-market/

22/08/2017 www.pdf-archive.com

IJETR2137 97%

Cloud encryption:

https://www.pdf-archive.com/2017/09/09/ijetr2137/

09/09/2017 www.pdf-archive.com

IJETR011307 96%

2321-0869, Volume-1, Issue-3, May 2013 Implementation of Chaotic based Image Encryption Algorithm with the application of Bhramgupta-Bhaskara equation Sanjay.R.chaudhari, Prof.

https://www.pdf-archive.com/2017/12/27/ijetr011307/

27/12/2017 www.pdf-archive.com

3N19-IJAET0319309 v7 iss1 30-37 96%

22311963 NEW INNOVATION OF ARABIC LANGUAGE ENCRYPTION TECHNIQUE USING NEW SYMMETRIC KEY ALGORITHM Prakash Kuppuswamy, Yahya Alqahtani Lecturer, Department of Computer Engineering &

https://www.pdf-archive.com/2014/07/04/3n19-ijaet0319309-v7-iss1-30-37/

04/07/2014 www.pdf-archive.com

Forensic Recovery of Scrambled Telephones 96%

For the first time, Android smartphone owners were supplied with a disk encryption feature that transparently scrambles user partitions, thus protecting sensitive user information against targeted attacks that bypass screen locks.

https://www.pdf-archive.com/2013/06/15/forensic-recovery-of-scrambled-telephones/

15/06/2013 www.pdf-archive.com

4I17-IJAET1117396 v6 iss5 1977-1987 96%

22311963 A LOGARITHM ENCRYPTION (EA-LOG) OF SYMMETRIC CRYPTOGRAPHY Mohammed Abdulridhu Hussain and Zaid Ameen Abduljabbar Department of Computer Science, College of Education, Basrah University, Basrah, Iraq ABSTRACT Cryptography is an area of computer science which is developed to provide security for the senders and receivers to transmit and receive confidential data through an insecure channel.

https://www.pdf-archive.com/2014/07/04/4i17-ijaet1117396-v6-iss5-1977-1987/

04/07/2014 www.pdf-archive.com

ZOC SSH Features 93%

4 Encryption.............................................................................................................................................

https://www.pdf-archive.com/2018/02/05/zoc-ssh-features/

05/02/2018 www.pdf-archive.com

backup lexington ky 93%

STOREITOFFSITE Your computer data is safely stored offsite, using army level encryption utilized by most international banks that need a higher level of protection.

https://www.pdf-archive.com/2014/08/29/backup-lexington-ky/

29/08/2014 www.pdf-archive.com

13I20-IJAET0520823 v7 iss2 410-415 93%

Traditional cryptographic techniques are used for encryption of digital data and steganographic algorithms are used to hide the encrypted data in the images.

https://www.pdf-archive.com/2014/07/04/13i20-ijaet0520823-v7-iss2-410-415/

04/07/2014 www.pdf-archive.com

Aarkstore - North American Air Compressor Market 92%

The “global encryption software market” is expected to reach $2.16 billion by 2020, growing at a CAGR (compounded annual growth rate) of CAGR of 14.27% from 2014 to 2020.

https://www.pdf-archive.com/2015/03/09/aarkstore-north-american-air-compressor-market/

09/03/2015 www.pdf-archive.com

IJEAS0405026 92%

An Encryption Algorithm meant for Secure Transactions Mukta Sharma, Dr.

https://www.pdf-archive.com/2017/09/10/ijeas0405026/

10/09/2017 www.pdf-archive.com

PDF Postman 92%

MessageLock strong encryption product has been granted a Mass Market Encryption export license by the U.S.

https://www.pdf-archive.com/2014/05/12/pdf-postman/

12/05/2014 www.pdf-archive.com