Results 71 to 80 of about 40,689 (200)

Analysis of cryptographic hash functions [PDF]

open access: yes, 2019
This thesis concentrates on analysis of cryptographic hash functions, one of the most important primitives used in the modern cryptography. We start with an introduction of the cryptographic hash functions, and a survey on the development of the cryptanalysis tools. To enrich the cryptanalysts' toolbox, we developed several interesting techniques under
openaire   +3 more sources

Blockchain for the Arts and Humanities

open access: yesFuture Humanities, Volume 4, Issue 1, May 2026.
ABSTRACT As born‐digital cultural materials proliferate, the arts and humanities require infrastructures that guarantee provenance, authenticity, and equitable access. This paper delivers a comprehensive, critical survey of blockchain's potential and limits across the sector.
James O'Sullivan
wiley   +1 more source

A Secure and Robust Image Hashing Scheme Using Gaussian Pyramids

open access: yesEntropy, 2019
Image hash is an alternative to cryptographic hash functions for checking integrity of digital images. Compared to cryptographic hash functions, an image hash or a Perceptual Hash Function (PHF) is resilient to content preserving distortions and ...
Iram Bashir   +4 more
doaj   +1 more source

Enhancing Cloud‐Based Healthcare Security With Quantum‐Secure HealthChain: A Quantum Computing and Blockchain Integrated Framework

open access: yesHealth Science Reports, Volume 9, Issue 5, May 2026.
ABSTRACT Background and Aims Rising quantum hazards and flaws in conventional encryption make cloud‐based healthcare data security harder. Quantum‐Secure HealthChain, a new architecture using blockchain and quantum computing, improves medical data security, patient privacy, and data fidelity. Methods To prevent quantum attacks, the proposed system uses
Rajesh Bose   +6 more
wiley   +1 more source

A Blockchain‐Less Traceability System for Agriculture Using DAG, IPFS, and Serverless Deployments

open access: yesInternational Journal of Network Management, Volume 36, Issue 3, May/June 2026.
ABSTRACT Ensuring transparency and integrity in agricultural data management is a critical challenge as the sector increasingly relies on advanced technologies. The primary problem is maintaining data traceability and security throughout the supply chain.
Antonio Villafranca   +6 more
wiley   +1 more source

Password protection in IT systems [PDF]

open access: yesBiuletyn Wojskowej Akademii Technicznej, 2018
The aim of the article is to systematise the methods of securing static passwords stored in IT systems. Pros and cons of those methods are presented and conclusions as a recommendation for IT system designers are proposed.
Przemysław Rodwald, Bartosz Biernacik
doaj   +1 more source

Can NSEC5 be practical for DNSSEC deployments? [PDF]

open access: yes, 2017
NSEC5 is proposed modification to DNSSEC that simultaneously guarantees two security properties: (1) privacy against offline zone enumeration, and (2) integrity of zone contents, even if an adversary compromises the authoritative nameserver responsible ...
Goldberg, Sharon   +6 more
core  

Data Clustering Method for Fault‐Tolerant Privacy Protection of Smart Grid Based on BGN Homomorphic Encryption Algorithm

open access: yesEngineering Reports, Volume 8, Issue 4, April 2026.
Smart meter (SM): Collect the data of users' electricity consumption periodically, and preprocess the noise reduction by using the Robust Local Weighted Regression algorithm, then encrypt the private data in it by Boneh‐Goh‐Nissim homomorphic encryption, and submit the encrypted private data to the fog node.
Jiangtao Guo   +5 more
wiley   +1 more source

Identification and Authentication Failures: Foundational Aspects of Strong Detection Mechanisms

open access: yesEngineering Reports, Volume 8, Issue 4, April 2026.
A review of recent techniques for detecting Identification and Authentication Failures in online platforms storing sensitive user data. Analyzed methods include biometric, hierarchical, blockchain, IoT‐based, EPICS, and VAP authentication systems. ABSTRACT Online platforms, such as e‐commerce and online apps, have become crucial in daily activities ...
Md. Maruf Hassan   +2 more
wiley   +1 more source

A perceptual hash function to store and retrieve large scale DNA sequences

open access: yes, 2014
This paper proposes a novel approach for storing and retrieving massive DNA sequences.. The method is based on a perceptual hash function, commonly used to determine the similarity between digital images, that we adapted for DNA sequences.
Bailly, Xavier   +3 more
core  

Home - About - Disclaimer - Privacy