Integration of OWL Password-Authenticated Key Exchange Protocol to Enhance IoT Application Protocols. [PDF]
Julio YR+4 more
europepmc +1 more source
Synergized security framework: revolutionizing wireless sensor networks through comparative methodological analysis. [PDF]
Su G, Zhang B.
europepmc +1 more source
Using Cryptographic Hash Functions for Discretionary Access Control in Object-Oriented Databases [PDF]
Ahmad Baraani-Dastjerdi+3 more
openalex +1 more source
A traceable authentication system based on blockchain for decentralized physical infrastructure networks. [PDF]
Liu L, Omote K.
europepmc +1 more source
Radical 2-Isogenies and Cryptographic Hash Functions in Dimensions 1, 2 and 3
Sabrina Kunzweiler+7 more
openalex +2 more sources
Preserving Privacy of Internet of Things Network with Certificateless Ring Signature. [PDF]
Zhang Y, Duan P, Li C, Zhang H, Ahmad H.
europepmc +1 more source
STITCH-256: A Dedicated Cryptographic Hash Function
Ramlan Mahmod+4 more
openaire +2 more sources
ESHA-256_GBGO: a high-performance and optimized security framework for internet of medical thing. [PDF]
Murugan G, Chinnadurai M.
europepmc +1 more source
Security Properties of Domain Extenders for Cryptographic Hash Functions [PDF]
Elena Andreeva+2 more
openalex +1 more source