-
1
-
2
-
3
-
4
Twofish: Automatic Edit Cascading for Diagrams
Published 2024“…To evaluate Twofish, we compared using Twofish and Figma to edit diagrams in six different scenarios, using three example diagrams. …”
Get full text
Thesis -
5
-
6
-
7
-
8
-
9
-
10
-
11
-
12
Improved Twofish Algorithm: A Digital Image Enciphering Application
Published 2021-01-01Subjects: Get full text
Article -
13
Improving Keystream Generation for Sosemanuk Stream Cipher Using Twofish Block Cipher
Published 2009-07-01Subjects: “…twofish block cipher…”
Get full text
Article -
14
Analysis security system performance MIPv6 in signaling process using AES and Twofish algorithms
Published 2021-11-01Subjects: “…mobile ipv6, ipsec, aes, twofish.…”
Get full text
Article -
15
Fog-Computing-Based Cyber–Physical System for Secure Food Traceability through the Twofish Algorithm
Published 2022-01-01“…Therefore, in this paper, data and account security techniques were introduced to efficiently secure product information through the Twofish algorithm and dual attestation for account verification. …”
Get full text
Article -
16
Analisis Perbandingan Kinerja Algoritma Kriptografi Serpent dan Twofish pada Dataset "World Bank Projects and Operations"
Published 2020-08-01“…Serpent dan Twofish merupakan algoritma kriptografi yang menduduki peringkat kedua dan ketiga dalam kompetisi Advanced Encryption Standard (AES). …”
Get full text
Article -
17
-
18
SMS: A Secure Healthcare Model for Smart Cities
Published 2020-07-01Subjects: Get full text
Article -
19
-
20
Privacy Preserving for Data Mining Applications
Published 2008-05-01Subjects: Get full text
Article