Results 111 to 120 of about 38,362 (243)

Improved 2-round collision attack on IoT hash standard ASCON-HASH

open access: yesHeliyon
Lightweight cryptography algorithms are a class of ciphers designed to protect data generated and transmitted by the Internet of Things. They typically have low requirements in terms of storage space and power consumption, and are well-suited for ...
Di Zhai   +4 more
doaj   +1 more source

Investigating Developer Sentiments in Software Components: An Exploratory Case Study of Gentoo

open access: yesSoftware: Practice and Experience, Volume 55, Issue 8, Page 1337-1360, August 2025.
ABSTRACT Background Developers, who are the main driving force behind software development, have central work in handling software components such as modules, libraries, and frameworks, which are the backbone of a project's architecture. Managing these components well ensures the smooth implementation of new features, maintains system integrity, and ...
Tien Rahayu Tulili   +2 more
wiley   +1 more source

KALwEN: A New Practical and Interoperable Key Management Scheme for Body Sensor Networks [PDF]

open access: yes, 2008
Key management is the pillar of a security architecture. Body sensor networks(BSNs) pose several challenges -- some inherited from wireless sensor networks(WSNs), some unique to themselves -- that require a new key management scheme to be tailor-made ...
Gong, Z.   +4 more
core   +2 more sources

Security in Metaverse Markets: Challenges and Solutions—A Comprehensive Review

open access: yesExpert Systems, Volume 42, Issue 8, August 2025.
ABSTRACT This review paper provides a systematic overview of the metaverse markets security problems and solutions. The metaverse is an emerging digital space, bridging virtual, augmented and mixed reality environments. As the metaverse evolves, issues related to customer security have emerged, which include breaches of privacy, thefts of identity and ...
Mohammad Z. Aloudat   +3 more
wiley   +1 more source

Hardware-based Security for Virtual Trusted Platform Modules

open access: yes, 2013
Virtual Trusted Platform modules (TPMs) were proposed as a software-based alternative to the hardware-based TPMs to allow the use of their cryptographic functionalities in scenarios where multiple TPMs are required in a single platform, such as in ...
Alsouri, Sami   +3 more
core  

A research on the impact of encryption algorithms on the quality of VPN tunnels’ transmission

open access: yesITM Web of Conferences, 2018
The following article presents the results on the impact of encryption algorithms and the cryptographic hash function on the QoS (Quality of Service) transmission in a computer network.
Strzęciwilk Dariusz   +3 more
doaj   +1 more source

Year 2010 Issues on Cryptographic Algorithms [PDF]

open access: yes
In the financial sector, cryptographic algorithms are used as fundamental techniques for assuring confidentiality and integrity of data used in financial transactions and for authenticating entities involved in the transactions.
Masashi Une, Masayuki Kanda
core  

Black-Box Property of Cryptographic Hash Functions [PDF]

open access: yes, 2012
We define a new black-box property of cryptographic hash function families H :{0,1}K ×{0,1}*→{0,1}y which guarantees that for a randomly chosen hash function H K from the family, everything "non-trivial" we are able to compute having access to the key K , we can compute only with oracle access to H K . If a hash function family is pseudo-random and has
openaire   +2 more sources

Home - About - Disclaimer - Privacy