Results 101 to 110 of about 167,764 (227)
Learning tool for IPSEC with emphasis on the use of MGRE in corporate networks
This paper presents a tool named “UV IPsec Tools”, developed to understand and interact in a didactic way with the transformations performed by IPsec when using the MD5, SHA-1 and 3DES algorithms for the encryption and integrity check of an IPv4 datagram.
Andrés Mauricio Ramírez +2 more
doaj
В данной статье предлагается вариант модификации известной хэш-функции с целью повышения ее стойкости. Показано, что при сохранении требований по быстродействию вычисления дайджеста сообщения на основе модифицированного алгоритма, вероятность коллизии второго рода существенно снижается.This article proposes a modification of the well-known hash ...
openaire +3 more sources
Data Storage Security in Cloud Computing Using AES Algorithm and MD5 Algorithm
Vaibhav Varma +4 more
openalex +1 more source
An Analisys of Business VPN Case Studies [PDF]
A VPN (Virtual Private Network) simulates a secure private network through a shared public insecure infrastructure like the Internet. The VPN protocol provides a secure and reliable access from home/office on any networking technology transporting IP ...
Crescenzio Gallo +2 more
core
Aspects of a Watermark Solution [PDF]
Although watermarking is a relatively new technology, there are many ways of applying it on an electronic data set with the purpose of ensuring copyright integrity and authenticity of the electronic data. But, bearing in mind the evolution of information
Crina RATIU +2 more
core
Research on the multi-message modification techniques on MD5
According to research on the message modification techniques presented by Wang Xiaoyun et al and the advanced message modification techniques proposed by Yu Sasaki et al, the multi-message modification techniques were founded to not be always able to ...
CHEN Shi-wei, JIN Chen-hui
doaj +2 more sources
Enhancing Byzantine fault tolerance using MD5 checksum and delay variation in Cloud services [PDF]
C. Sathya, S. Agilan, A. G. Aruna
openalex +1 more source
El presente artículo aborda de manera general algunas de las funciones resúmenes (hash) más empleadas en criptografía tales como MD5, SHA-1, RIPEMD y HAVAL, así como los algoritmos básicos de funcionamiento de cada una de ellas, su aplicación o uso y sus
Lic. Sandra Blain Escalona +1 more
doaj

