Results 1 to 10 of about 1,420 (145)

Model for Storing Tokens in Local Storage (Cookies) Using JSON Web Token (JWT) with HMAC (Hash-based Message Authentication Code) in E-Learning Systems

open access: goldJournal of Applied Engineering and Technological Science (JAETS), 2022
E-learning is a technology that may be used in the learning process to improve not only the distribution of learning materials but also the ability of learners to modify their abilities of various competencies contained in a database. A Web Service is used to integrate the data. Web Service is a set of standards and programming methods for sharing data
Syabdan Dalimunthe   +2 more
doaj   +5 more sources

Data Security of Encrypted Data Using Hash-Based Message Authentication Code (HMAC) and T9-Based Data Conversion

open access: closedPUP Journal of Science and Technology, 2018
The researcher has recently been working on the authenticity of information particularly with the use of cryptographic hash functions such as MD5 and Secure Hash Algorithm (SHA). After critically analyzing the Hash-based Message Authentication Code (HMAC) algorithm, the researcher finds out that it can still be improved and strengthened by adding the ...
Francis G. Balazon
doaj   +4 more sources

Advancing the Cryptographic Hash-Based Message Authentication Code [PDF]

open access: closedInternational Journal of Engineering and Technology, 2011
In today's word the authentication is very much required for the purpose of the transfer of the information from one place to another. Now a day's the use of E-mail become very popular because of their fast and easy to use in nature. This new technology has led to the problem of Authentication of the Message.
Gaurav Gaurav   +2 more
openaire   +2 more sources

Hash-Based Message Authentication Code with a Reverse Fuzzy Extractor for a CMOS Image Sensor [PDF]

open access: goldElectronics
The MIPI (Mobile Industry Processor Interface) Alliance provides a security framework for in-vehicle network connections between sensors and processing electronic control units (ECUs). One approach within this framework is data integrity verification for sensors with limited hardware resources.
Yuki Rogi   +6 more
openaire   +2 more sources

A formal analysis of Trusted Platform Module 2.0 hash‐based message authentication code authorization under digital rights management scenario [PDF]

open access: closedSecurity and Communication Networks, 2015
AbstractTrusted Platform Module (TPM) is the “root of trust” of the whole trusted computing platform. The TPM's own security assurance is very important. This paper describes the TPM 2.0 hash‐based message authentication code (HMAC) authorization scheme as a security protocol and makes a detail comparison of the TPM 2.0 authorization to the TPM 1.2 ...
Juan Wang   +12 more
openaire   +2 more sources

Increasing Cryptography Security using Hash-based Message Authentication Code [PDF]

open access: diamondInternational Journal of Engineering and Technology, 2019
Dr.Mohammad Hossein Shakour   +1 more
openaire   +2 more sources

An Enhanced Hash-based Message Authentication Code using BCrypt

open access: bronzeInternational Journal for Research in Applied Science and Engineering Technology, 2018
Jerone B. Alimpia
openaire   +2 more sources

Key derivation function: key-hash based computational extractor and stream based pseudorandom expander. [PDF]

open access: yesPeerJ Comput Sci
The key derivation function is a specific cryptographic algorithm that transforms private string and public strings into one or more cryptographic keys.
Chuah CW, Harun NZ, Hamid IRA.
europepmc   +3 more sources

Paillier-Based Data Aggregation and Stimulation Scheme in the Smart Grid [PDF]

open access: yesJisuanji gongcheng, 2021
To address the privacy disclosure issues in data aggregation and stimulation in smart grids,a Paillier-based data aggregation and stimulation scheme is proposed for smart grids.The scheme employs a super-increasing sequence to construct multidimensional ...
ZHU Song, WANG Huaqun
doaj   +1 more source

Digital signatures over HMAC entangled chains

open access: yesEngineering Science and Technology, an International Journal, 2022
In this work we present a new digital signature method based on hash chains and the hash message authentication code (HMAC). Unlike Blockchain technology, our approach establishes that the database of transactions is distributed among users, so each one ...
Luis Adrián Lizama-Pérez
doaj   +1 more source

Home - About - Disclaimer - Privacy