Results 21 to 30 of about 275,015 (197)
Tıbbi DICOM Veri Güvenliğinde Hibrit Yöntemlerin Kullanılması
DICOM (Digital Imaging and Communications in Medicine – Tıpta Dijital Görüntüleme ve İletişim) tıbbi görüntülerin arşivlenmesi, daha sonradan kullanılması, farklı yerlere dağıtılması ve sunulmasını sağlayan bir dosya standartıdır. Bu standartta dosyalar,
İnan Güler +2 more
doaj +1 more source
HungerHash: A Distributed Network for Child-Hunger Relief based on Hedera Hashgraph
This paper proposes a hunger relief network based on crypto-currency and a hybrid mix of centralized and decentralized databases which is totally formed by the volunteers and donors and is out of control of centralized organizations. The centralized part
Kubra Kalkan, Naser Jam
doaj +1 more source
Realization of different-shaped electromagnetic band gap antennas for Wi-Fi applications [PDF]
The primary objective of this paper is to conduct a comparative analysis of diverse Electromagnetic Band Gap (EBG) antennas in terms of their suitability for Wi-Fi applications operating at 5 GHz.
Premalatha Bantupalli +3 more
doaj +1 more source
Coverless VoIP Steganography Using Hash and Hash
Performing secure and robust embedding and extracting in real time voice streams without deteriorating the voice quality is a great challenge. This paper aims on hiding the secret data bits in the voice packets without modifying any data in the cover ...
Deepikaa S., Saravanan R.
doaj +1 more source
Hybrid Consensus Algorithm Based on Modified Proof-of-Probability and DPoS
As the core of blockchain technology, the consensus algorithm plays an important role in determining the security, data consistency, and efficiency of blockchain systems. The existing mainstream consensus algorithm is experiencing difficulties satisfying
Baocheng Wang, Zetao Li, Haibin Li
doaj +1 more source
Hybrid Cryptography with a One–Time Stamp to Secure Contact Tracing for COVID–19 Infection
The COVID-19 pandemic changed the lives of millions of citizens worldwide in the manner they live and work to the so-called new norm in social standards.
El-Douh Ahmed Abdel-Rahim +3 more
doaj +1 more source
Preservation of Digital Images: Question of Fixity
One of the most important aspects of the long-term digital-image preservation strategy is maintaining data fixity, i.e., assuring the integrity and authenticity of original data.
Alexey Tikhonov
doaj +1 more source
Optimization of Tree Modes for Parallel Hash Functions: A Case Study [PDF]
This paper focuses on parallel hash functions based on tree modes of operation for an inner Variable-Input-Length function. This inner function can be either a single-block-length (SBL) and prefix-free MD hash function, or a sponge-based hash function ...
Atighehchi, Kevin, Rolland, Robert
core +1 more source
C Source code Obfuscation using Hash Function and Encryption Algorithm
Obfuscation is a technique for transforming program code into a different form that is more difficult to understand. Several obfuscation methods are used to obfuscate source code, including dead code insertion, code transposition, and string encryption ...
Sarah Rosdiana Tambunan, Nur Rokhman
doaj +1 more source
Analysing the Performance of GPU Hash Tables for State Space Exploration [PDF]
In the past few years, General Purpose Graphics Processors (GPUs) have been used to significantly speed up numerous applications. One of the areas in which GPUs have recently led to a significant speed-up is model checking.
Cassee, Nathan, Wijs, Anton
core +4 more sources

