A review of collisions in cryptographic hash function used in digital forensic tools
Zulfany Erlisa Rasjid +3 more
openalex +1 more source
S-HASH: A Crack Towards Cryptographic Hash Functions
Kaushal Jangid, Vidushi
openalex +2 more sources
Two secure authentication protocols for mitigating vulnerabilities in IoD. [PDF]
Safkhani M, Ghorbani Fard M.
europepmc +1 more source
Data security storage and transmission framework for AI computing power platforms. [PDF]
Chen J +5 more
europepmc +1 more source
IBS-ECDHE: A blockchain-enhanced lightweight protocol for secure cloud-IoT in biomedical HCPS. [PDF]
Rehman AU +6 more
europepmc +1 more source
Ethical AI in Healthcare: Integrating Zero-Knowledge Proofs and Smart Contracts for Transparent Data Governance. [PDF]
Ezz M, Alaerjan AS, Mostafa AM.
europepmc +1 more source
Secure AODV using Symmetric Key Cryptography with Cyclic Chain Hash Function (CCHF)
Sitanshu S. Singh +2 more
openalex +1 more source
A Secure and Efficient Authentication Scheme with Privacy Protection for Internet of Medical Things. [PDF]
Xu F, Wu J, An Q, Ziaur R.
europepmc +1 more source
Quantum secured blockchain framework for enhancing post quantum data security. [PDF]
Reddy NR +5 more
europepmc +1 more source

