Results 201 to 210 of about 555,076 (261)
A robust algorithm for authenticated health data access via blockchain and cloud computing. [PDF]
Shahzad A+4 more
europepmc +1 more source
Secure software development: leveraging application call graphs to detect security vulnerabilities. [PDF]
Yan L, Zhao G, Li X, Sun P.
europepmc +1 more source
An Efficient Cluster-Based Mutual Authentication and Key Update Protocol for Secure Internet of Vehicles in 5G Sensor Networks. [PDF]
Su X, Xu Y.
europepmc +1 more source
Blockchain based solution for secure information sharing in pharma supply chain management. [PDF]
Padma A, Ramaiah M.
europepmc +1 more source
DRPChain: A new blockchain-based trusted DRM scheme for image content protection. [PDF]
Yun J, Liu X, Lu Y, Guan J, Liu X.
europepmc +1 more source
Physical One-Way Functions for Decentralized Consensus Via Proof of Physical Work. [PDF]
Winkler M+9 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Troika: a ternary cryptographic hash function
Designs, Codes and Cryptography, 2019Linear codes over finite fields are one of the most well-studied areas in coding theory. While codes over finite fields of characteristic two are of particular practical interest due to their good implementation properties, ternary codes have been extensively studied as well.
Stefan Kölbl+3 more
openaire +5 more sources
Cryptographic Hash Function: A High Level View
2013 International Conference on Informatics and Creative Multimedia, 2013Cryptographic hash function verifies data integrity and sender identity or source of information. The task is accomplished by taking a variable bit patterns as an input then produces a fixed bit patterns of output. This paper provides a detailed overview to include classification, properties, constructions, attacks, applications and an overview of a ...
Imad Fakhri Taha Alshaikhli+2 more
openaire +3 more sources