Results 131 to 140 of about 45,527 (206)

A scalable and secure federated learning authentication scheme for IoT. [PDF]

open access: yesSci Rep
Chithaluru P   +6 more
europepmc   +1 more source

On Cryptographic Hash Functions: Definitions, Ideas and Practical Cryptographic Attacks

open access: yes
Hash functions, and cryptographic hash functions in particular, underpin the technologies on which modern life is built. Efficient databases, the Internet, the World Wide Web, online payments and more, would not be possible without the security and efficiency gains derived from the use of these functions.
openaire   +1 more source

Home - About - Disclaimer - Privacy