Results 71 to 80 of about 36,351 (194)
MicroCrypt: High-Efficiency Hashing for Next-Generation IoT Devices
The Internet of Things (IoT) is growing quickly and connecting more devices than ever before. This has made it more important to improve security protocols, especially cryptographic hash functions that work in places with limited computing, storage, and ...
Shatha H. Jafer Al-Khalisy +5 more
doaj +1 more source
ABSTRACT AI‐generated images have become so good in recent years that individuals often cannot distinguish them from ‘real’ images. This development, combined with the rapid spread of AI‐generated content online, creates a series of societal risks. Watermarking, a technique that involves embedding information within the content to indicate their AI ...
Bram Rijsbosch +2 more
wiley +1 more source
Analysis of cryptographic hash functions [PDF]
This thesis concentrates on analysis of cryptographic hash functions, one of the most important primitives used in the modern cryptography. We start with an introduction of the cryptographic hash functions, and a survey on the development of the cryptanalysis tools. To enrich the cryptanalysts' toolbox, we developed several interesting techniques under
openaire +3 more sources
Blockchain for the Arts and Humanities
ABSTRACT As born‐digital cultural materials proliferate, the arts and humanities require infrastructures that guarantee provenance, authenticity, and equitable access. This paper delivers a comprehensive, critical survey of blockchain's potential and limits across the sector.
James O'Sullivan
wiley +1 more source
ABSTRACT Background and Aims Rising quantum hazards and flaws in conventional encryption make cloud‐based healthcare data security harder. Quantum‐Secure HealthChain, a new architecture using blockchain and quantum computing, improves medical data security, patient privacy, and data fidelity. Methods To prevent quantum attacks, the proposed system uses
Rajesh Bose +6 more
wiley +1 more source
Survey of Lightweight Hardware-Based Hash Functions for Security in Constrained IoT Devices
Lightweight cryptographic primitives are commonly used to secure communication in resource-constrained IoT devices such as RFID tags, sensors, actuators, wireless sensor networks, and edge gateways.
Mohsin Khan +3 more
doaj +1 more source
A Blockchain‐Less Traceability System for Agriculture Using DAG, IPFS, and Serverless Deployments
ABSTRACT Ensuring transparency and integrity in agricultural data management is a critical challenge as the sector increasingly relies on advanced technologies. The primary problem is maintaining data traceability and security throughout the supply chain.
Antonio Villafranca +6 more
wiley +1 more source
A Lightweight Hash-Based Blockchain Architecture for Industrial IoT
Blockchain is a technology that can ensure data integrity in a distributed network, and it is actively applied in various fields. Recently, blockchain is gaining attention due to combining with the Internet of Things (IoT) technology in the industrial ...
Byoungjin Seok +2 more
doaj +1 more source
Omega network hash construction [PDF]
Cryptographic hash functions are very common and important cryptographic primitives. They are commonly used for data integrity checking and data authentication.
Chuah, Chai Wen
core
Smart meter (SM): Collect the data of users' electricity consumption periodically, and preprocess the noise reduction by using the Robust Local Weighted Regression algorithm, then encrypt the private data in it by Boneh‐Goh‐Nissim homomorphic encryption, and submit the encrypted private data to the fog node.
Jiangtao Guo +5 more
wiley +1 more source

