Results 1 to 10 of about 1,420 (145)
E-learning is a technology that may be used in the learning process to improve not only the distribution of learning materials but also the ability of learners to modify their abilities of various competencies contained in a database. A Web Service is used to integrate the data. Web Service is a set of standards and programming methods for sharing data
Syabdan Dalimunthe +2 more
doaj +5 more sources
The researcher has recently been working on the authenticity of information particularly with the use of cryptographic hash functions such as MD5 and Secure Hash Algorithm (SHA). After critically analyzing the Hash-based Message Authentication Code (HMAC) algorithm, the researcher finds out that it can still be improved and strengthened by adding the ...
Francis G. Balazon
doaj +4 more sources
Advancing the Cryptographic Hash-Based Message Authentication Code [PDF]
In today's word the authentication is very much required for the purpose of the transfer of the information from one place to another. Now a day's the use of E-mail become very popular because of their fast and easy to use in nature. This new technology has led to the problem of Authentication of the Message.
Gaurav Gaurav +2 more
openaire +2 more sources
Hash-Based Message Authentication Code with a Reverse Fuzzy Extractor for a CMOS Image Sensor [PDF]
The MIPI (Mobile Industry Processor Interface) Alliance provides a security framework for in-vehicle network connections between sensors and processing electronic control units (ECUs). One approach within this framework is data integrity verification for sensors with limited hardware resources.
Yuki Rogi +6 more
openaire +2 more sources
A formal analysis of Trusted Platform Module 2.0 hash‐based message authentication code authorization under digital rights management scenario [PDF]
AbstractTrusted Platform Module (TPM) is the “root of trust” of the whole trusted computing platform. The TPM's own security assurance is very important. This paper describes the TPM 2.0 hash‐based message authentication code (HMAC) authorization scheme as a security protocol and makes a detail comparison of the TPM 2.0 authorization to the TPM 1.2 ...
Juan Wang +12 more
openaire +2 more sources
Increasing Cryptography Security using Hash-based Message Authentication Code [PDF]
Dr.Mohammad Hossein Shakour +1 more
openaire +2 more sources
An Enhanced Hash-based Message Authentication Code using BCrypt
Jerone B. Alimpia
openaire +2 more sources
Key derivation function: key-hash based computational extractor and stream based pseudorandom expander. [PDF]
The key derivation function is a specific cryptographic algorithm that transforms private string and public strings into one or more cryptographic keys.
Chuah CW, Harun NZ, Hamid IRA.
europepmc +3 more sources
Paillier-Based Data Aggregation and Stimulation Scheme in the Smart Grid [PDF]
To address the privacy disclosure issues in data aggregation and stimulation in smart grids,a Paillier-based data aggregation and stimulation scheme is proposed for smart grids.The scheme employs a super-increasing sequence to construct multidimensional ...
ZHU Song, WANG Huaqun
doaj +1 more source
Digital signatures over HMAC entangled chains
In this work we present a new digital signature method based on hash chains and the hash message authentication code (HMAC). Unlike Blockchain technology, our approach establishes that the database of transactions is distributed among users, so each one ...
Luis Adrián Lizama-Pérez
doaj +1 more source

