Results 1 to 10 of about 1,501 (168)

Data Security of Encrypted Data Using Hash-Based Message Authentication Code (HMAC) and T9-Based Data Conversion

open access: diamondPUP Journal of Science and Technology, 2018
The researcher has recently been working on the authenticity of information particularly with the use of cryptographic hash functions such as MD5 and Secure Hash Algorithm (SHA).
Francis G. Balazon
doaj   +4 more sources

The Model for Storing Tokens in Local Storage (Cookies) Using JSON Web Token (JWT) with HMAC (Hash-based Message Authentication Code) in E-Learning Systems

open access: goldJournal of Applied Engineering and Technological Science, 2022
E-learning is a technology that may be used in the learning process to improve not only the distribution of learning materials but also the ability of learners to modify their abilities of various competencies contained in a database.
Syabdan Dalimunthe   +2 more
doaj   +4 more sources

Hash-Based Message Authentication Code with a Reverse Fuzzy Extractor for a CMOS Image Sensor [PDF]

open access: goldElectronics
The MIPI (Mobile Industry Processor Interface) Alliance provides a security framework for in-vehicle network connections between sensors and processing electronic control units (ECUs). One approach within this framework is data integrity verification for sensors with limited hardware resources.
Yuki Rogi   +6 more
openaire   +2 more sources

A Secure and Efficient Authentication Scheme with Privacy Protection for Internet of Medical Things [PDF]

open access: yesSensors
The Internet of Medical Things represents a pivotal application of Internet of Things technology in Healthcare 4.0, offering substantial practical benefits in enhancing medical quality, reducing costs, and minimizing errors.
Feihong Xu   +3 more
doaj   +2 more sources

Hash-based message authentication code with secure hash algorithm-256 for efficient data sharing in blockchain

open access: diamondIndonesian Journal of Electrical Engineering and Computer Science
Recently, <span lang="EN-US">cloud servers have increasingly been utilized for storing a large amount of data, which is stored in the form of ciphertext. In a decentralised system, the communication overhead on the network is recognized as the main problem due to the numerous transaction data recorded across the data Sharding and nodes with ...
Naveenkumar Lingaraju   +1 more
openaire   +3 more sources

A formal analysis of Trusted Platform Module 2.0 hash‐based message authentication code authorization under digital rights management scenario [PDF]

open access: closedSecurity and Communication Networks, 2015
AbstractTrusted Platform Module (TPM) is the “root of trust” of the whole trusted computing platform. The TPM's own security assurance is very important. This paper describes the TPM 2.0 hash‐based message authentication code (HMAC) authorization scheme as a security protocol and makes a detail comparison of the TPM 2.0 authorization to the TPM 1.2 ...
Fajiang Yu   +6 more
openaire   +2 more sources

Advancing the Cryptographic Hash-Based Message Authentication Code

open access: closedInternational Journal of Engineering and Technology, 2011
In today's word the authentication is very much required for the purpose of the transfer of the information from one place to another. Now a day's the use of E-mail become very popular because of their fast and easy to use in nature. This new technology has led to the problem of Authentication of the Message.
Manish Kumar   +2 more
openaire   +2 more sources

Increasing Cryptography Security using Hash-based Message Authentication Code [PDF]

open access: diamondInternational Journal of Engineering and Technology, 2019
Seyyed Mehdi Mousavi   +1 more
openaire   +2 more sources

An Enhanced Hash-based Message Authentication Code using BCrypt

open access: bronzeInternational Journal for Research in Applied Science and Engineering Technology, 2018
Jerone B. Alimpia
openaire   +2 more sources

Digital signatures over HMAC entangled chains

open access: yesEngineering Science and Technology, an International Journal, 2022
In this work we present a new digital signature method based on hash chains and the hash message authentication code (HMAC). Unlike Blockchain technology, our approach establishes that the database of transactions is distributed among users, so each one ...
Luis Adrián Lizama-Pérez
doaj   +1 more source

Home - About - Disclaimer - Privacy