Results 101 to 110 of about 12,815 (252)

Integrating identity-based cryptography in IMS service authentication [PDF]

open access: yesInternational Journal of Network Security & Its Applications 1.3 (2009) 1-13, 2010
Nowadays, the IP Multimedia Subsystem (IMS) is a promising research field. Many ongoing works related to the security and the performances of its employment are presented to the research community. Although, the security and data privacy aspects are very important in the IMS global objectives, they observe little attention so far.
arxiv  

Collision-resistant hash function based on composition of functions [PDF]

open access: yesARIMA, Vol. 14 - pp. 167-183, 2011, 2011
cryptographic hash function is a deterministic procedure that compresses an arbitrary block of numerical data and returns a fixed-size bit string. There exist many hash functions: MD5, HAVAL, SHA, ... It was reported that these hash functions are not longer secure.
arxiv  

SIMULASI KUNCI ELEKTRONIK DENGAN ENKRIPSI MELALUI BLUETOOTH PADA PONSEL

open access: yesCommIT Journal, 2008
Currently the facility provided by mobile phones is very diverse. Starting from the phone, SMS, camera, music player, all rolled into one. Obviously the phone can also be used as electronic keys to replace the existing analog key at this time.
Indri Neforawati, Hoga Saragih
doaj   +1 more source

Comparison Based Analysis of Different Cryptographic and Encryption Techniques Using Message Authentication Code (MAC) in Wireless Sensor Networks (WSN) [PDF]

open access: yesarXiv, 2012
Wireless Sensor Networks (WSN) are becoming popular day by day, however one of the main issue in WSN is its limited resources. We have to look to the resources to create Message Authentication Code (MAC) keeping in mind the feasibility of technique used for the sensor network at hand.
arxiv  

An Efficient Cryptographic Hash Algorithm (BSA) [PDF]

open access: yesIn Proceedings of The 10th National Workshop on Cryptology (NWCR), 2010, PSG College of Technology, Peelamedu,Coimbatore, September 2-4, 2010, 2012
Recent cryptanalytic attacks have exposed the vulnerabilities of some widely used cryptographic hash functions like MD5 and SHA-1. Attacks in the line of differential attacks have been used to expose the weaknesses of several other hash functions like RIPEMD, HAVAL.
arxiv  

Peningkatan Sistem Keamanan Autentikasi Single Sign On (SSO) Menggunakan Algoritma AES dan One-Time Password Studi Kasus: SSO Universitas Ubudiyah Indonesia

open access: yesJurnal Rekayasa Elektrika, 2016
Single Sign On (SSO) merupakan model autentikasi independen yang diimplementasikan Universitas Ubudiyah Indonesia (UUI) menggunakan Message-Digest Algorithm 5 (MD5) dan web service NuSOAP berbasis bahasa pemograman PHP.
Zuhar Musliyana   +2 more
doaj   +1 more source

Automated family-based naming of small RNAs for next generation sequencing data using a modified MD5-digest algorithm [PDF]

open access: yesarXiv, 2012
We developed NameMyGene, a web tool and a stand alone program to easily generate putative family-based names for small RNA sequences so that laboratories can easily organize, analyze, and observe patterns from, the massive amount of data generated by next-generation sequencers.
arxiv  

Chosen-Prefix Collisions on AES-like Hashing

open access: yesIACR Transactions on Symmetric Cryptology
Chosen-prefix collision (CPC) attack was first presented by Stevens, Lenstra and de Weger on MD5 at Eurocrypt 2007. A CPC attack finds a collision for any two chosen prefixes, which is a stronger variant of collision attack. CPCs are naturally harder to
Shiyao Chen   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy