Results 151 to 160 of about 13,015 (291)
A secured cloud‐medical data sharing with A‐BRSA and Salp ‐Ant Lion Optimisation Algorithm
Abstract Sharing medical data among healthcare providers, researchers, and patients is crucial for efficient healthcare services. Cloud‐assisted smart healthcare (s‐healthcare) systems have made it easier to store EHRs effectively. However, the traditional encryption algorithms used to secure this data can be vulnerable to attacks if the encryption key
Adel Binbusayyis+7 more
wiley +1 more source
Hash function use for triangular mesh reconstruction
Václav Skala+2 more
openalex +2 more sources
Attacks on hash functions and applications
Cryptografische hashfuncties, of simpelweg hashfuncties, zijn een van de belangrijkste bouwstenen binnen de cryptografie. Een hashfunctie is een algoritme dat voor elk willekeurig bericht een korte hash-waarde van een vast aantal bits (bv. 256 bits) berekent. Zulke hash-waarden worden gebruikt als een soort van vingerafdruk om het originele bericht mee
openaire +4 more sources
Abstract The Internet of Things (IoT) in deploying robotic sprayers for pandemic‐associated disinfection and monitoring has garnered significant attention in recent research. The authors introduce a novel architectural framework designed to interconnect smart monitoring robotic devices within healthcare facilities using narrowband Internet of Things ...
Md Motaharul Islam+9 more
wiley +1 more source
Hash Functions from Sigma Protocols and Improvements to VSH [PDF]
Mihir Bellare, Todor Ristov
openalex +1 more source
Abstract Data is the key element that runs the modern society. Large amounts of data are being released day by day as a result of many activities. The digital data is transferred through the Internet which may be vulnerable to attacks while transmitting. Especially, the medical data is observed to be of at most importance.
Rupa Ch+4 more
wiley +1 more source
Robust Multi-property Combiners for Hash Functions Revisited [PDF]
Marc Fischlin+2 more
openalex +1 more source
Hash functions in Cryptography
This thesis is concerned with giving both an overview of the application of hash functions in cryptography and a presentation of today's standard cryptographic hash functions. Cryptographic hash functions are a valuable tool in cryptography. They are applied in many areas of information security to provide protection of the authenticity of messages ...
openaire +1 more source
Bat algorithm based on kinetic adaptation and elite communication for engineering problems
Abstract The Bat algorithm, a metaheuristic optimization technique inspired by the foraging behaviour of bats, has been employed to tackle optimization problems. Known for its ease of implementation, parameter tunability, and strong global search capabilities, this algorithm finds application across diverse optimization problem domains. However, in the
Chong Yuan+6 more
wiley +1 more source
Background There is growing evidence for the role of circadian factors in adolescents' sleep and academic adjustment, with greater evening preference being linked to poorer academic functioning. However, studies have yet to evaluate this association prospectively in adolescence, nor have studies examined daytime sleepiness as a putative mechanism ...
Joseph W. Fredrick+3 more
wiley +1 more source