Results 21 to 30 of about 72,170 (255)

Comparative Study and Analysis on Integrity of Data Files Using Different Tools and Techniques

open access: yesJournal of Information Security and Cybercrimes Research, 2021
Digital forensic investigation is the scientific process of collection, preservation, examination, analysis, documentation and presentation of digital evidence from digital devices, so that the evidence is in compliance with legal terms and acceptable in
Kumarshankar Raychaudhuri   +2 more
doaj   +1 more source

A Defense Scheme of Primary User Emulation Attack in Cognitive Radio [PDF]

open access: yesJisuanji gongcheng, 2016
In order to avoid the adverse effects of the Primary User Emulation Attack(PUEA) in Cognitive Radio(CR) network,an authentication scheme based on Hash chain is proposed.Two occasions are considered in this scheme,one is PUEA between primary users and ...
MA Shenghong,LONG Min
doaj   +1 more source

A Secure Communication Method Based on Message Hash Chain

open access: yesApplied Sciences, 2022
Traditional network communication methods lack endogenous security mechanisms, which is the root cause of network security problems, e.g., spoofing identity and address forgery.
Mingxuan Han, Wenbao Jiang
doaj   +1 more source

User privacy prevention model using supervised federated learning‐based block chain approach for internet of Medical Things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan   +7 more
wiley   +1 more source

A Data Preservation Method Based on Blockchain and Multidimensional Hash for Digital Forensics

open access: yesComplexity, 2021
Since digital forensics becomes more and more popular, more and more attention has been paid to the originality and validity of data, and data preservation technology emerges as the times require.
Gongzheng Liu, Jingsha He, Xinggang Xuan
doaj   +1 more source

Dynamic Graphs on the GPU [PDF]

open access: yes, 2020
We present a fast dynamic graph data structure for the GPU. Our dynamic graph structure uses one hash table per vertex to store adjacency lists and achieves 3.4–14.8x faster insertion rates over the state of the art across a diverse set of large datasets,
Ashkiani, Saman   +3 more
core   +1 more source

Hash-Chain-Based Cross-Regional Safety Authentication for Space-Air-Ground Integrated VANETs

open access: yesApplied Sciences, 2020
With the increasing demand for intelligent traffic management and road network intelligent information services, the vehicular ad hoc networks (VANETs) combined with information of air, space and ground have outstanding advantages in coverage, reliable ...
Gege Luo   +3 more
doaj   +1 more source

SEABASS: Symmetric-keychain Encryption and Authentication for Building Automation Systems [PDF]

open access: yes, 2018
There is an increasing security risk in Building Automation Systems (BAS) in that its communication is unprotected, resulting in the adversary having the capability to inject spurious commands to the actuators to alter the behaviour of BAS.
Keoh, Sye Loong   +3 more
core   +1 more source

Efficient Constructions for One-way Hash Chains [PDF]

open access: yes, 2003
Abstract: "One-way chains are an important cryptographic primitive in many security applications. Lamport first proposed to use one-way chains for one-time password authentication [19]. Subsequently, researchers proposed one-way chains as a basic building block for digital cash, for extending the lifetime of digital certificates, for constructing one ...
Yih-Chun Hu   +2 more
openaire   +1 more source

Reversible and Plausibly Deniable Covert Channels in One-Time Passwords Based on Hash Chains

open access: yesApplied Sciences, 2021
Covert channels enable stealthy communications over innocent appearing carriers. They are increasingly applied in the network context. However, little work is available that exploits cryptographic primitives in the networking context to establish such ...
Jörg Keller, Steffen Wendzel
doaj   +1 more source

Home - About - Disclaimer - Privacy