Results 151 to 160 of about 36,351 (194)

On Cryptographic Hash Functions: Definitions, Ideas and Practical Cryptographic Attacks

open access: yes
Hash functions, and cryptographic hash functions in particular, underpin the technologies on which modern life is built. Efficient databases, the Internet, the World Wide Web, online payments and more, would not be possible without the security and efficiency gains derived from the use of these functions.
openaire   +1 more source

IBS-ECDHE: A blockchain-enhanced lightweight protocol for secure cloud-IoT in biomedical HCPS. [PDF]

open access: yesComput Struct Biotechnol J
Rehman AU   +6 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy