Results 11 to 20 of about 3,302 (195)

User privacy prevention model using supervised federated learning‐based block chain approach for internet of Medical Things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan   +7 more
wiley   +1 more source

Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network

open access: yesIET Networks, EarlyView., 2022
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley   +1 more source

Verification of Implementations of Cryptographic Hash Functions

open access: yesIEEE Access, 2017
Cryptographic hash functions have become the basis of modern network computing for identity authorization and secure computing; protocol consistency of cryptographic hash functions is one of the most important properties that affect the security and ...
Dexi Wang   +5 more
doaj   +1 more source

Integrity verification for digital Holy Quran verses using cryptographic hash function and compression

open access: yesJournal of King Saud University: Computer and Information Sciences, 2020
Data Integrity is one of the primary concepts in information security. The main task of the cryptographic hash function is to assure the integrity of the transmitted data.
Mishal Almazrooie   +5 more
doaj   +1 more source

Analysis of the amplitude form of the quantum hash function

open access: yesУчёные записки Казанского университета: Серия Физико-математические науки, 2023
In this article, the properties of quantum hash functions are further explored. Previous findings show that so-called small-bias sets (special subsets of the set of elements of a cyclic group) generate a “phase” quantum hash function. Here, it was proved
M. F. Ablayev   +2 more
doaj   +1 more source

Theoretical and Experimental Analysis of Cryptographic Hash Functions

open access: yesJournal of Telecommunications and Information Technology, 2019
The paper presents a theoretical introduction to the cryptographic hash function theory and a statistical experimental analysis of selected hash functions.
Jacek Tchórzewsk   +1 more
doaj   +1 more source

High Throughput Implementation of the Keccak Hash Function Using the Nios-II Processor

open access: yesTechnologies, 2020
Presently, cryptographic hash functions play a critical role in many applications, such as digital signature systems, security communications, protocols, and network security infrastructures.
Argyrios Sideris   +2 more
doaj   +1 more source

An application of residue number system arithmetics to secure hash functions design [PDF]

open access: yesBulletin of Natural Sciences Research
This paper presents a cryptographic hash function based on the Residue Number System (RNS), designed to enhance security and computational efficiency. The function leverages the parallelism and modular properties of RNS to achieve high-speed processing ...
Pavlović Milija   +3 more
doaj   +1 more source

Reversible and Plausibly Deniable Covert Channels in One-Time Passwords Based on Hash Chains

open access: yesApplied Sciences, 2021
Covert channels enable stealthy communications over innocent appearing carriers. They are increasingly applied in the network context. However, little work is available that exploits cryptographic primitives in the networking context to establish such ...
Jörg Keller, Steffen Wendzel
doaj   +1 more source

Example of internal function for Sponge scheme built on the basis of the generalized AES design methodology

open access: yesDoklady Belorusskogo gosudarstvennogo universiteta informatiki i radioèlektroniki, 2021
The purpose of this article is to construct an internal function underlying the “Sponge” scheme for constructing  cryptographic  hash  functions.  An  internal  function in  the  “Sponge”  scheme  is  a  fixed-length transformation  or  permutation  that 
R. M. Ospanov   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy