Results 1 to 10 of about 1,501 (168)
The researcher has recently been working on the authenticity of information particularly with the use of cryptographic hash functions such as MD5 and Secure Hash Algorithm (SHA).
Francis G. Balazon
doaj +4 more sources
E-learning is a technology that may be used in the learning process to improve not only the distribution of learning materials but also the ability of learners to modify their abilities of various competencies contained in a database.
Syabdan Dalimunthe +2 more
doaj +4 more sources
Hash-Based Message Authentication Code with a Reverse Fuzzy Extractor for a CMOS Image Sensor [PDF]
The MIPI (Mobile Industry Processor Interface) Alliance provides a security framework for in-vehicle network connections between sensors and processing electronic control units (ECUs). One approach within this framework is data integrity verification for sensors with limited hardware resources.
Yuki Rogi +6 more
openaire +2 more sources
A Secure and Efficient Authentication Scheme with Privacy Protection for Internet of Medical Things [PDF]
The Internet of Medical Things represents a pivotal application of Internet of Things technology in Healthcare 4.0, offering substantial practical benefits in enhancing medical quality, reducing costs, and minimizing errors.
Feihong Xu +3 more
doaj +2 more sources
Recently, <span lang="EN-US">cloud servers have increasingly been utilized for storing a large amount of data, which is stored in the form of ciphertext. In a decentralised system, the communication overhead on the network is recognized as the main problem due to the numerous transaction data recorded across the data Sharding and nodes with ...
Naveenkumar Lingaraju +1 more
openaire +3 more sources
A formal analysis of Trusted Platform Module 2.0 hash‐based message authentication code authorization under digital rights management scenario [PDF]
AbstractTrusted Platform Module (TPM) is the “root of trust” of the whole trusted computing platform. The TPM's own security assurance is very important. This paper describes the TPM 2.0 hash‐based message authentication code (HMAC) authorization scheme as a security protocol and makes a detail comparison of the TPM 2.0 authorization to the TPM 1.2 ...
Fajiang Yu +6 more
openaire +2 more sources
Advancing the Cryptographic Hash-Based Message Authentication Code
In today's word the authentication is very much required for the purpose of the transfer of the information from one place to another. Now a day's the use of E-mail become very popular because of their fast and easy to use in nature. This new technology has led to the problem of Authentication of the Message.
Manish Kumar +2 more
openaire +2 more sources
Increasing Cryptography Security using Hash-based Message Authentication Code [PDF]
Seyyed Mehdi Mousavi +1 more
openaire +2 more sources
An Enhanced Hash-based Message Authentication Code using BCrypt
Jerone B. Alimpia
openaire +2 more sources
Digital signatures over HMAC entangled chains
In this work we present a new digital signature method based on hash chains and the hash message authentication code (HMAC). Unlike Blockchain technology, our approach establishes that the database of transactions is distributed among users, so each one ...
Luis Adrián Lizama-Pérez
doaj +1 more source

