Download PDFOpen PDF in browserA Survey of Digital Security in Applications and Networking12 pages•Published: March 21, 2024AbstractFrom the time the Internet was invented to now, security standards have changed dras- tically. Security risks are not only applicable to businesses but also has spilled over into the government and personal realm as well. Newly created threats are being created every day and mitigation techniques need to be capable of being changed in a moment’s notice. Cybersecurity is an environment in which one must adapt to changes or else they will lose. Keyphrases: SHA, RSA, public key, private key, asymmetric key, plaintext, digital sig- nature, security.Keyphrases: asymmetric key, digital signature, private key, public key, rsa, security, sha In: Ajay Bandi, Mohammad Hossain and Ying Jin (editors). Proceedings of 39th International Conference on Computers and Their Applications, vol 98, pages 77-88.
|