• No se han encontrado resultados

Data Encryption Standard

Desarrollo de un algoritmo para romper por fuerza bruta al Simplified Data Encryption Standard (S DES) mediante el uso de computación paralela

Desarrollo de un algoritmo para romper por fuerza bruta al Simplified Data Encryption Standard (S DES) mediante el uso de computación paralela

... Simplified Data Encryption Estándar (S-DES), el cual será ejecutado tanto de manera serial, tradicionalmente empleada, como en forma paralela utilizando para este efecto las herramientas de computación ...

157

Um Estudo Comparativo entre algoritmos de criptografia DES – Lucifer (1977) e AES – Rijndael (2000)

Um Estudo Comparativo entre algoritmos de criptografia DES – Lucifer (1977) e AES – Rijndael (2000)

... Advanced Encryption Standard(AES), que passa a substituir o Data Encryption Standard (DES) - leva a algumas questões: que melhorias foram incorporadas no novo padrão, além de garantir ...

7

Encriptación simétrica de señales usando arquitecturas neuronales

Encriptación simétrica de señales usando arquitecturas neuronales

... (Simplified Data Encryption Standard), en el cual se ob- tienen buenos resultados, teniendo en cuenta que, tras realizar el entrenamiento de la red se tiene una precisión del ...

208

A low cost advance encryption standard (AES) co-processor implementation

A low cost advance encryption standard (AES) co-processor implementation

... Advanced Encryption Standard (AES) was officially named the successor to the Data Encryption Standard (DES) in ...the encryption of DES as well as successful brute force attacks ...

7

An Introduction to IP Security (IPSec) Encryption

An Introduction to IP Security (IPSec) Encryption

... Security Association (SA)This is an instance of security policy and keying material applied to a data flow. Both IKE and IPsec use SAs, although SAs are independent of one another. IPsec SAs are unidirectional and ...

26

Modelo para la implementación de la técnica de Tokenización como mecanismo de protección de datos personales

Modelo para la implementación de la técnica de Tokenización como mecanismo de protección de datos personales

... el data vault, el cual tiene la seguridad necesaria para proteger la información, para el modelo de la base de datos relacional que tiene el negocio, no se verá afectado el tipo de dato que se almacena (texto, ...

107

Standard Operationing Procedure

Standard Operationing Procedure

... Un Standard Operationing Procedure constituye un manual sencillo de procedimientos, cuyo objetivo principal es brindar una guía al usuario de Sistemas de Información Geográfica, para desarrollar su propia ...

21

Building Standard Law

Building Standard Law

... This text is based on the Building Standard Law and related regulations. It is intended to be used solely as a reference to facilitate in the understanding of the Law and related regulations BCJ will not be ...

237

Using viral taxonomy as an  encryption technique

Using viral taxonomy as an encryption technique

...  The basic objective is to propose the design to develop a Virus‐ the organism based communication system for intelligence information transfer; A secure data communication through V‐technology. The taxonomy tree ...

24

A conceptual model for query processing in wireless sensors: an application to the agriculture

A conceptual model for query processing in wireless sensors: an application to the agriculture

... collected data is challenging since the monitoring sensors can collect and stream large amounts of raw data ...big data heterogeneous streams must be correctly and timely processed in order to serve ...

175

MEG-BIDS, the brain imaging data structure extended to magnetoencephalography

MEG-BIDS, the brain imaging data structure extended to magnetoencephalography

... BIDS specifications and JSON schemas. Note that there are no JSON LD context files, but with attention to backward compatibility with present BIDS specifications, they could be added in future versions. There is also ...

5

BANCO STANDARD CHARTERED COLOMBIA

BANCO STANDARD CHARTERED COLOMBIA

... Las políticas de riesgo de mercado, entre los que se encuentra los límites de exposición de VAR, la exposición por monto y stop loss, entre otros, se han mantenido en niveles conservadores. No obstante, como medida para ...

7

BANCO STANDARD CHARTERED COLOMBIA

BANCO STANDARD CHARTERED COLOMBIA

... Los indicadores de liquidez de Standard Chartered son unos de los más altos del mercado representando el 56% de los activos del banco comparado con el 20% del promedio del mercado. Existe una alta concentración de ...

8

About standards: potential and limitations in forest design

About standards: potential and limitations in forest design

... During the past 200 years, numerous techni- cal standards of measuring attributes of indivi- dual trees and forest stands have been developed. Important attributes are diameters and heights; stem forms, volumes and ...

8

Desarrollo de un mecanismo de cifrado basado en el algoritmo criptográfico simétrico AES

Desarrollo de un mecanismo de cifrado basado en el algoritmo criptográfico simétrico AES

... The present work was based on the development of the encryption mechanism based on the AES symmetric cryptographic algorithm (MECIB-AES) to compare the security that is provided with the encrypted information. The ...

139

A Homomorphic-Based Multiple Data Aggregation Scheme for Smart Grid

A Homomorphic-Based Multiple Data Aggregation Scheme for Smart Grid

... The data aggregation system is a three-layer system, which is shown in ...consumption data to the corresponding ...consumption data and applies a homomorphic encryption and a signature to ...

9

Análisis y optimización del algoritmo de encriptación Rijndael  en el que se basa el estándar de encriptación avanzada AES  (Advanced Encryption Standard)

Análisis y optimización del algoritmo de encriptación Rijndael en el que se basa el estándar de encriptación avanzada AES (Advanced Encryption Standard)

... nombre original), es una especificación para el cifrado de datos electrónicos. El cifrado es un proceso de codificación de mensajes o información vital de tal manera que sólo las partes canónicas pueden leerlo. El ...

208

Efficacy of a Transdiagnostic internet based treatment for emotional disorders with a specific component to address positive affect: Study protocol for a randomized controlled trial

Efficacy of a Transdiagnostic internet based treatment for emotional disorders with a specific component to address positive affect: Study protocol for a randomized controlled trial

... A three-armed randomized controlled trial (RCT) will be conducted. Participants will be randomly allocated to one of three conditions: a) Transdiagnostic Internet-based proto- col (TIBP), b) Transdiagnostic ...

14

Using end-to-end data encryption to secure SIP device configuration

Using end-to-end data encryption to secure SIP device configuration

... We can find that, if the file size is less than 1MB, and the system takes time less than 1s. As we all know, for most file data, the size is not very large. However, if the file is a streaming media file, such as ...

6

An Internet based treatment for flying phobia (NO FEAR Airlines): study protocol for a randomized controlled trial

An Internet based treatment for flying phobia (NO FEAR Airlines): study protocol for a randomized controlled trial

... Intention-to-treat (ITT) and per protocol analyses (PPA) will be conducted following the CONSORT recommendations and SPIRIT guidelines for reporting the results [48–50]. Dif- ferences in demographic and baseline clinical ...

11

Show all 5647 documents...

Related subjects