Omega deoxyribonucleic acid cryptography key-based authentication. [PDF]
Chuah CW, Tey J, Mohamad KM.
europepmc +1 more source
A Novel QR Code-Based Solution for Secure Electronic Health Record Transfer in Venous Thromboembolism Home Rehabilitation Management: Algorithm Development and Validation. [PDF]
Li C +5 more
europepmc +1 more source
Trust By Design: Enabling Responsible Precision Health Through Blockchain-Powered Digital Twins And Trusted AI. [PDF]
Vasiliu-Feltes I +4 more
europepmc +1 more source
A custom hash algorithm for hosting secure gray scale image repository in public cloud. [PDF]
Murugesan V +2 more
europepmc +1 more source
Security of Quantum Key Distribution with One-Time-Pad-Protected Error Correction and Its Performance Benefits. [PDF]
Novak R.
europepmc +1 more source
Privacy preservation in blockchain-based healthcare data sharing: A systematic review. [PDF]
Li K, Lohachab A, Dumontier M, Urovi V.
europepmc +1 more source
Related searches:
Traditionally message authentication codes (MACs) and the process of encryption are treated as orthogonal security mechanisms, where MACs are used to prove data authenticity while encryption is used to preserve confidentiality. In this paper we propose to integrate the two in a framework where the parameterized hash value of an encrypted image is ...
Sachin Kashyap, Kannan Karthik
openaire +1 more source
Identity-Based Authenticated Broadcast Encryption and Distributed Authenticated Encryption
2004Since its introduction, broadcast encryption has attracted many useful applications. In this paper, we propose two identity-based schemes for authenticated broadcasting and distributed message authentication. The first scheme supports multiple broadcasters and allows each broadcaster to dynamically broadcast messages into an arbitrary group of ...
Yi Mu +3 more
openaire +1 more source
Authenticated encryption in SSH
Proceedings of the 9th ACM conference on Computer and communications security - CCS '02, 2002The Secure Shell (SSH) protocol is one of the most popular cryptographic protocols on the Internet. Unfortunately, the current SSH authenticated encryption mechanism is insecure. In this paper we propose several fixes to the SSH protocol and, using techniques from modern cryptography, we prove that our modified versions of SSH meet strong new chosen ...
Mihir Bellare +2 more
openaire +1 more source
Disk-enabled authenticated encryption
2010 IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST), 2010Storage is increasingly becoming a vector for data compromise. Solutions for protecting on-disk data confidentiality and integrity to date have been limited in their effectiveness. Providing authenticated encryption, or simultaneous encryption with integrity information, is important to protect data at rest.
Kevin Butler +2 more
openaire +1 more source

