منابع مشابه
Email Encryption using RC4 Algorithm
In the communication age, in the daily life people constantly uses communication tools that are e-mail marketing, instant messaging, social networking, search engines, bookmarking systems, affiliate systems, print media and direct mail. These tools are used as an internet communication. However as a result of widespread of internet usage, security problems have become more important year by yea...
متن کاملEvaluation of the RC4 Algorithm for Data Encryption
Analysis of the effect of different parameters of the RC4 encryption algorithm where examined. Some experimental work was performed to illustrate the performance of this algorithm based on changing some of these parameters. The execution time as a function of the encryption key length and the file size was examined; this has been stated as complexity and security. Various data types were analyz...
متن کاملRC4 Enrichment Algorithm Approach for Selective Image Encryption
This paper is introduces RC4 Enrichment Algorithm Approach for selective image encryption. This approach is derived from the standard RC4 algorithm. RC4 algorithm is already used for image encryption and also for the selective image encryption. Currently RC4 is vulnerable. Lots of cryptanalytic found the lots of weakness, vulnerable point and attacks inside the RC4 algorithm. So in this concern...
متن کاملCustomer Lifetime Value Models: A literature Survey
Abstract Customer Lifetime Value (CLV) is known as an important concept in marketing and management of organizations to increase the captured profitability. Total value that a customer produces during his/her lifetime is named customer lifetime value. The generated value can be calculated through different methods. Each method considers different parameters. Due to the industry, firm, business...
متن کاملVideo Encryption: A Survey
Multimedia data security is becoming important with the continuous increase of digital communications on internet. The encryption algorithms developed to secure text data are not suitable for multimedia application because of the large data size and real time constraint. In this paper, classification and description of various video encryption algorithms are presented. Analysis and Comparison o...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Procedia Computer Science
سال: 2015
ISSN: 1877-0509
DOI: 10.1016/j.procs.2015.02.129