Limpar
135 resultados

Acesso aberto

Tipo do recurso

Ano de criação

Produção nacional

Revisado por pares

Áreas

Idioma

Editores

Artigo Acesso aberto Revisado por pares

M Mesran, Dahlan Abdullah, Dedy Hartama, R Roslina, Ankush Asri, Robbi Rahim, Ansari Saleh Ahmar,

... and for secure every form data an algorithm Base64 are needed, Base64 algorithm is used as data format to transmit data due to the result of base64 itself, but Base64 algorithm is not safe enough because it is ... and compresses plaintext, so the encoding result from Base64 is re-secured and compressed using HAVAL algorithm ... not take many bytes of data compared with Base64 algorithm

Tópico(s): Cloud Computing and Resource Management

2018 - IOP Publishing | Journal of Physics Conference Series

Artigo Acesso aberto Revisado por pares

Wojciech Muła, Daniel Lemire,

... documents, we first encode them as text using base64. Standard base64 encoding uses 64~ASCII characters: both lower and ... We show how we can encode and decode base64 data at nearly the speed of a memory ... several times fewer instructions than previous SIMD-accelerated base64 codecs. It is also more versatile, as it can be adapted---even at runtime---to any base64 variant by only changing constants.

Tópico(s): Algorithms and Data Compression

2019 - Wiley | Software Practice and Experience

Artigo Acesso aberto Revisado por pares

Wojciech Muła, Daniel Lemire,

Web developers use base64 formats to include images, fonts, sounds, and other resources directly inside HTML, JavaScript, JSON, and XML files. We estimate that billions of base64 messages are decoded every day. We are motivated to improve the efficiency of base64 encoding and decoding. Compared to state-of-the- ... reports errors when encountering characters outside of the base64 set. It is available online as free software ...

Tópico(s): Cellular Automata and Applications

2018 - Association for Computing Machinery | ACM Transactions on the Web

Artigo Acesso aberto Revisado por pares

Imam Riadi, Abdul Fadlil, Fahmi Auliya Tsani,

... by first converting a digital image into a base64 encoding format so that the encryption process can ... containing the radix-64 letter arrangement used for base64 encoding. Conversely, the decryption process is carried out ... so we get the image file in the base64 encoding format. Then, the image with the base64 encoding format is decoded into the original file. ...

Tópico(s): Decision Support System Applications

2022 - Pusat Layanan Difabel | JISKA (Jurnal Informatika Sunan Kalijaga)

Artigo Acesso aberto Revisado por pares

Robbi Rahim, Heri Nurdiyanto, Rahmat Hidayat, Ansari Saleh Ahmar, Dodi Siregar, Andysah Putera Utama Siahaan, Ilham Faisal, Sayuti Rahman, Diana Suita, Ahmad Zamsuri, Dahlan Abdullah, Darmawan Napitupulu, Muhammad Ikhsan Setiawan, S Sriadhi,

... data. The main objective of the use of base64 method is to convert any file in order ... paper discusses a steganography and encoding method using base64, which is a set of encoding schemes that ... is used to embed encoding text performed by Base64. As an example, for the mechanisms a file ...

Tópico(s): Digital Media Forensic Detection

2018 - IOP Publishing | Journal of Physics Conference Series

Artigo Revisado por pares

Yi Zhang, Linlin Kong, Fei Wang, Bo Li, Chao Ma, Dong Chen, Kai Liu, Chunhai Fan, Hongjie Zhang,

... a major challenge. To address this, an optimized Base64 method is developed and accordingly we realized a ... a DNA single strand. In this strategy, by Base64 encoding, code reshaping and balancing, and data mapping, ...

Tópico(s): Quantum-Dot Cellular Automata

2020 - Elsevier BV | Nano Today

Artigo Acesso aberto Revisado por pares

Heri Nurdiyanto, Robbi Rahim, Ansari Saleh Ahmar, Muhammad Syahril, Muhammad Dahria, Herlina Ahmad,

... bits, the use of cryptographic algorithms such as Base64 and Word Auto Key Encryption can be a solution that produces a secure ciphertext, base64 algorithm which can encode all objects such as ...

Tópico(s): Multimedia Learning Systems

2018 - IOP Publishing | Journal of Physics Conference Series

Artigo Revisado por pares

Azizi Abas, Yuhanis Yusof, Farzana Kabir Ahmad,

... on the selection of compression algorithms and use base64 encoder/decoder to increase the capacity of data ... compression algorithm after the data was encoded with base64 encoder/decoder.

Tópico(s): QR Code Applications and Technologies

2017 - Universiti Teknikal Malaysia Melaka | Journal of Telecommunication Electronic and Computer Engineering (JTEC)

Capítulo de livro

Ajeet Ram Pathak, Sarita D. Deshpande, Mudra Panchal,

... types of file formats using AES (Rijndael) and Base64 encoding, which will be later stored on MySQL ... encoding and encryption. The critical aspect of using Base64 is for encoding binary data into ASCII text ...

Tópico(s): Advanced Steganography and Watermarking Techniques

2019 - Springer International Publishing | Lecture notes in networks and systems

Artigo Acesso aberto Revisado por pares

Robbi Rahim, Sumarno Sumarno, Mochammad Tanzil Multazam, Suyono Thamrin, Siswo Hadi Sumantri,

... text while non-text data requires special algorithms. Base64 is an encoding algorithm that can convert non- ... as the GOST algorithm. The combination of the BASE64 and GOST algorithms is expected to be able ... third parties. The results of the combination of Base64 and GOST algorithms are expected to be able ...

Tópico(s): Advanced Malware Detection Techniques

2019 - IOP Publishing | Journal of Physics Conference Series

Artigo Acesso aberto Revisado por pares

Jaehyuk Lee, Kyungroul Lee,

... in entropy. Therefore, if the attacker applies a base64 encoding algorithm to the encrypted files, files infected ... measurement method by applying various encoding algorithms including base64 and various file formats. To this end, we ...

Tópico(s): Information and Cyber Security

2022 - Multidisciplinary Digital Publishing Institute | Entropy

Artigo Acesso aberto Revisado por pares

Heri Nurdiyanto, Robbi Rahim, Nur Wulan,

... which developed from Transposition Cipher and also use Base64 algorithm for encryption ending process, and from experiment ...

Tópico(s): Coding theory and cryptography

2017 - IOP Publishing | Journal of Physics Conference Series

Artigo

Abdul Aziz Alimul Hidayat, Pristiwanto Pristiwanto,

... people who are not entitled to access them. Base64 algorithm is one of the algorithms for encoding ... the QR Code login wifi network using the base64 algorithm makes using wifi can be overcome and ...

Tópico(s): Mobile and Web Applications

2020 - | Jurnal Sistem Komputer dan Informatika (JSON)

Artigo

Jianghua Luo,

A MD5-Base64 based hybrid encryption algorithm was introduced,which encrypted plain text to 32-bit hexadecimal cipher text by MD5 ... encrypted the 128-bit binary array by using Base64 algorithm.This algorithm can avoid getting user's ...

Tópico(s): Embedded Systems and FPGA Design

2012 - Science Press | Journal of Computer Applications

Artigo Acesso aberto Revisado por pares

Robbi Rahim, R Ratnadewi, Deddy Prayama, Ervan Asri, Davis Belmiro Satria,

... it easily implemented in any media, combination of Base64 algorithm and One Time Pad as encoding and ...

Tópico(s): User Authentication and Security Systems

2018 - IOP Publishing | IOP Conference Series Materials Science and Engineering

Artigo Acesso aberto

Muhammad Farras Muttaqin,

... Standard 128 (AES-128) algorithm combined with Token-Base64.AES-128 algorithm is used in the encryption ... description of name and parameter values, then Token-Base64 for encoding and decoding processes with Token at ... that the combination of AES-128 and Token-Base64 algorithms can prevent SQL Injection attacks with a ...

Tópico(s): Advanced Malware Detection Techniques

2020 - The World Academy of Research in Science and Engineering | International Journal of Advanced Trends in Computer Science and Engineering

Artigo Revisado por pares

P. Mathivanan, A. Balaji Ganesh,

Tópico(s): Brain Tumor Detection and Classification

2022 - Springer Science+Business Media | Multimedia Tools and Applications

Artigo Revisado por pares

Yubin Ren, Yi Zhang, Yawei Liu, Qinglin Wu, Juanjuan Su, Fan Wang, Dong Chen, Chunhai Fan, Kai Liu, Hongjie Zhang,

... RaptorQ-Arithmetic-LZW-RS (RALR) and RaptorQ-Arithmetic-Base64-RS (RABR) systems, are developed. The two concatenated ...

Tópico(s): DNA and Nucleic Acid Chemistry

2022 - Wiley | Small Methods

Artigo Revisado por pares

Jasleen Kaur, Alka Agrawal, Raees Ahmad Khan,

... approaches. The data obfuscation approach is compared to Base64, Base32, Hexadecimal and MONcrypt while the location obfuscation ...

Tópico(s): Privacy-Preserving Technologies in Data

2022 - Elsevier BV | Journal of King Saud University - Computer and Information Sciences

Artigo Acesso aberto Revisado por pares

Yubin Ren, Yi Zhang, Yawei Liu, Qinglin Wu, Honggang Hu, Jinɡjinɡ Li, Chunhai Fan, Dong Chen, Kai Liu, Hongjie Zhang,

... highly efficient encoding systems, i.e. RaptorQ-Arithmetic-Base64-Shuffle-RS (RABSR) and RaptorQ-Arithmetic-Huffman-Rotary- ...

Tópico(s): Advanced biosensing and bioanalysis techniques

2021 - Elsevier BV | Fundamental Research

Artigo Acesso aberto Revisado por pares

Marco Botta, Davide Cavagnino,

Printable string encodings are widely used in several applications that cannot deal with binary data, the most known example being the mail system. In this paper, we investigate the potential of some of the proposed encodings to hide and carry extra information. We describe a framework for reversibly embedding data in printable string encodings, like Base45. The method leverages the characteristic of some encodings that are not surjective by using illegal configurations to embed one bit of information. ...

Tópico(s): DNA and Biological Computing

2021 - Multidisciplinary Digital Publishing Institute | Applied Sciences

Artigo Acesso aberto Revisado por pares

Reece K. Hart, Andreas Prlić,

... application of the SHA-512 hashing algorithm with Base64 encoding to generate URL-safe identifiers. This convention, ...

Tópico(s): Gene expression and cancer classification

2020 - Public Library of Science | PLoS ONE

Artigo Revisado por pares

Muhammad Asim, Muhammad Faisal Amjad, Waseem Iqbal, Hammad Afzal, Haider Abbas, Yin Zhang⋆,

... Downloads, Cookies, Bookmarks, Chrome stored user credentials, decode base64 encoded images, Tabs information etc. Finally, a comparative ...

Tópico(s): Digital Media Forensic Detection

2018 - Elsevier BV | Future Generation Computer Systems

Artigo Acesso aberto Revisado por pares

Musa W. Dube,

<img src="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAA9QAAACZCAYAAADO+nKrAAAAAXNSR0IArs4c6QAAAARnQU1BAACxjwv8YQUAAAAJcEhZcwAADsMAAA7DAcdvqGQAAP+lSURBVHhe7N0HuHVHWfbxbddPsIJ0CFWkCRFEpCNSRUoERGpAIJTQa6RD6CAqRQwiJIAkVKlCQEAp0qQjHem2r/e6v/WbvP/jZHHeQkKqua9rn7X3WjPPPH2embXO3t+zXbDZBf/v//2/zf/9v/938/3f//2b7/me7xmfv/d7v3fP1b0DOe3/83/+z5uzn/3sm//23/7b5gd+ ...

Tópico(s): Postcolonial and Cultural Literary Studies

2018 - | Scriptura

Capítulo de livro Revisado por pares

Loris D’Antoni, Margus Veanes,

... to prove the correctness of complex implementations of BASE64 and UTF encoders, and to expose data parallelism ...

Tópico(s): Software Testing and Debugging Techniques

2017 - Springer Science+Business Media | Lecture notes in computer science

Artigo Acesso aberto Revisado por pares

Seshagiri Prabhu, Anu Vazhayil, Padmamala Sriram,

... usually obfuscated, often with encodings like hexadecimal, unicode, base64, escaped characters and rarely with substitution ciphers like ...

Tópico(s): Network Security and Intrusion Detection

2016 - Elsevier BV | Procedia Computer Science

Artigo Acesso aberto

S. Monikandan, L. Arockiam,

... MONcrypt compares with existing obfuscation techniques like Base32, Base64 and Hexadecimal Encoding. The proposed technique provides better ...

Tópico(s): Cryptography and Data Security

2015 - Indian Society for Education and Environment | Indian Journal of Science and Technology

Artigo Acesso aberto

S. Monikandan, L. Arockiam,

... MONcrypt compares with existing obfuscation techniques like Base32, Base64 and Hexadecimal Encoding. The proposed technique provides better ...

Tópico(s): Privacy-Preserving Technologies in Data

2015 - Indian Society for Education and Environment | Indian Journal of Science and Technology

Artigo Acesso aberto

Ekhiotz Jon Vergara, Simin Nadjm‐Tehrani, Mihails Prihodko,

... with two different data exchange formats (JSON and Base64). The illustrative use case helped to identify the ...

Tópico(s): Caching and Content Delivery

2014 - Elsevier BV | Sustainable Computing Informatics and Systems

Artigo Revisado por pares

Nicole Beebe, Laurence A. Maddox, Lishu Liu, Minghe Sun,

... past (Microsoft Office 2010 files, file system data, base64, base85, URL encoding, flash video, M4A, MP4, WMV, ...

Tópico(s): Network Security and Intrusion Detection

2013 - Institute of Electrical and Electronics Engineers | IEEE Transactions on Information Forensics and Security