Information is an essential resource for the development of projects that require constant communication between a sender and receiver, based on a set of protocols that allow interaction between various applications asynchronously. However, they present security risks such as theft, destruction, leakage and modification, which can have consequences on a personal and organizational level. To guarantee that this information complies with the principles of confidentiality, integrity and availability, the application of a cryptographic algorithm is necessary. For this reason, a performance comparison was made with respect to encryption and decryption of the AES (Advanced Encryption Standard) algorithms and the Blowfish algorithm; using the Java...
Information is one of the most important assets that an organization has and is normally generated b...
Information and Communication Technologies are increasingly used in organizations, which bring many ...
This document aims to provide the reader with information about the Des and 3Des Encryption algorith...
En los últimos años, el crecimiento exponencial de las interconexiones entre dispositivos digitales ...
RESUMEN La seguridad es uno los aspectos más desafiantes de la internet y las aplicaciones de red. L...
Las interacciones sociales normalmente involucran personas con distintos intereses, incluso interese...
Currently, telecommunications and especially mobile communications have taken great importance and r...
In this project you can find a study about different encryption algorithms, which are use to safegua...
Las interacciones sociales normalmente involucran personas con distintos intereses, incluso interese...
In this project you can find a study about different encryption algorithms, which are use to safegua...
This paper presents the dimentions that defines the Information Security essentials from the authors...
This paper presents the dimentions that defines the Information Security essentials from the authors...
This paper presents the dimentions that defines the Information Security essentials from the authors...
This paper presents the dimentions that defines the Information Security essentials from the authors...
Las interacciones sociales normalmente involucran personas con distintos intereses, incluso interese...
Information is one of the most important assets that an organization has and is normally generated b...
Information and Communication Technologies are increasingly used in organizations, which bring many ...
This document aims to provide the reader with information about the Des and 3Des Encryption algorith...
En los últimos años, el crecimiento exponencial de las interconexiones entre dispositivos digitales ...
RESUMEN La seguridad es uno los aspectos más desafiantes de la internet y las aplicaciones de red. L...
Las interacciones sociales normalmente involucran personas con distintos intereses, incluso interese...
Currently, telecommunications and especially mobile communications have taken great importance and r...
In this project you can find a study about different encryption algorithms, which are use to safegua...
Las interacciones sociales normalmente involucran personas con distintos intereses, incluso interese...
In this project you can find a study about different encryption algorithms, which are use to safegua...
This paper presents the dimentions that defines the Information Security essentials from the authors...
This paper presents the dimentions that defines the Information Security essentials from the authors...
This paper presents the dimentions that defines the Information Security essentials from the authors...
This paper presents the dimentions that defines the Information Security essentials from the authors...
Las interacciones sociales normalmente involucran personas con distintos intereses, incluso interese...
Information is one of the most important assets that an organization has and is normally generated b...
Information and Communication Technologies are increasingly used in organizations, which bring many ...
This document aims to provide the reader with information about the Des and 3Des Encryption algorith...