Results 71 to 80 of about 36,351 (194)

MicroCrypt: High-Efficiency Hashing for Next-Generation IoT Devices

open access: yesProceedings of the International Conference on Applied Innovations in IT
The Internet of Things (IoT) is growing quickly and connecting more devices than ever before. This has made it more important to improve security protocols, especially cryptographic hash functions that work in places with limited computing, storage, and ...
Shatha H. Jafer Al-Khalisy   +5 more
doaj   +1 more source

Missing the Mark: Adoption of Watermarking for Generative AI Systems in Practice and Implications Under the New EU AI Act

open access: yesPolicy &Internet, Volume 18, Issue 2, June 2026.
ABSTRACT AI‐generated images have become so good in recent years that individuals often cannot distinguish them from ‘real’ images. This development, combined with the rapid spread of AI‐generated content online, creates a series of societal risks. Watermarking, a technique that involves embedding information within the content to indicate their AI ...
Bram Rijsbosch   +2 more
wiley   +1 more source

Analysis of cryptographic hash functions [PDF]

open access: yes, 2019
This thesis concentrates on analysis of cryptographic hash functions, one of the most important primitives used in the modern cryptography. We start with an introduction of the cryptographic hash functions, and a survey on the development of the cryptanalysis tools. To enrich the cryptanalysts' toolbox, we developed several interesting techniques under
openaire   +3 more sources

Blockchain for the Arts and Humanities

open access: yesFuture Humanities, Volume 4, Issue 1, May 2026.
ABSTRACT As born‐digital cultural materials proliferate, the arts and humanities require infrastructures that guarantee provenance, authenticity, and equitable access. This paper delivers a comprehensive, critical survey of blockchain's potential and limits across the sector.
James O'Sullivan
wiley   +1 more source

Enhancing Cloud‐Based Healthcare Security With Quantum‐Secure HealthChain: A Quantum Computing and Blockchain Integrated Framework

open access: yesHealth Science Reports, Volume 9, Issue 5, May 2026.
ABSTRACT Background and Aims Rising quantum hazards and flaws in conventional encryption make cloud‐based healthcare data security harder. Quantum‐Secure HealthChain, a new architecture using blockchain and quantum computing, improves medical data security, patient privacy, and data fidelity. Methods To prevent quantum attacks, the proposed system uses
Rajesh Bose   +6 more
wiley   +1 more source

Survey of Lightweight Hardware-Based Hash Functions for Security in Constrained IoT Devices

open access: yesIEEE Access
Lightweight cryptographic primitives are commonly used to secure communication in resource-constrained IoT devices such as RFID tags, sensors, actuators, wireless sensor networks, and edge gateways.
Mohsin Khan   +3 more
doaj   +1 more source

A Blockchain‐Less Traceability System for Agriculture Using DAG, IPFS, and Serverless Deployments

open access: yesInternational Journal of Network Management, Volume 36, Issue 3, May/June 2026.
ABSTRACT Ensuring transparency and integrity in agricultural data management is a critical challenge as the sector increasingly relies on advanced technologies. The primary problem is maintaining data traceability and security throughout the supply chain.
Antonio Villafranca   +6 more
wiley   +1 more source

A Lightweight Hash-Based Blockchain Architecture for Industrial IoT

open access: yesApplied Sciences, 2019
Blockchain is a technology that can ensure data integrity in a distributed network, and it is actively applied in various fields. Recently, blockchain is gaining attention due to combining with the Internet of Things (IoT) technology in the industrial ...
Byoungjin Seok   +2 more
doaj   +1 more source

Omega network hash construction [PDF]

open access: yes, 2009
Cryptographic hash functions are very common and important cryptographic primitives. They are commonly used for data integrity checking and data authentication.
Chuah, Chai Wen
core  

Data Clustering Method for Fault‐Tolerant Privacy Protection of Smart Grid Based on BGN Homomorphic Encryption Algorithm

open access: yesEngineering Reports, Volume 8, Issue 4, April 2026.
Smart meter (SM): Collect the data of users' electricity consumption periodically, and preprocess the noise reduction by using the Robust Local Weighted Regression algorithm, then encrypt the private data in it by Boneh‐Goh‐Nissim homomorphic encryption, and submit the encrypted private data to the fog node.
Jiangtao Guo   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy