Results 211 to 220 of about 12,847 (250)
Some of the next articles are maybe not open access.

A Cloud based Improved File Handling and Duplicate Removal using MD5

International Conference on Adaptive and Intelligent Systems, 2023
In the era of data duplication, the document checksum approach is commonly used to quickly and accurately identify redundant information. The calculated value of numbers and letters used to validate the validity of a file's contents It can determine ...
Dr.M.Kathiravan   +5 more
semanticscholar   +1 more source

Salt Hash Password Using MD5 Combination for Dictionary Attack Protection

2023 6th International Conference of Computer and Informatics Engineering (IC2IE), 2023
Using MD5 hashing of passwords in web logins is highly vulnerable to dictionary attacks. One online application for cracking hashed passwords using a dictionary attack that is free and easy to use is crackstation.net.
Agung Nugroho, T. Mantoro
semanticscholar   +1 more source

Research and Improvement of Secure Hash Algorithm Based on MD5

2023 4th International Conference on Big Data, Artificial Intelligence and Internet of Things Engineering (ICBAIE), 2023
With the continuous development of the Internet, the MD5 algorithm is widely used in the field of computer security. Aiming at the shortcomings of the traditional MD5 salting algorithm, this paper proposes an improved MD5 salting algorithm, which is ...
Xiaosong Yao   +6 more
semanticscholar   +1 more source

Role of MD5 Message-Digest Algorithm for Providing Security to Low-Power Devices

International Conference Intelligent Computing and Control Systems, 2022
With the growing realisation that traditional business perimeter and security architecture are no longer viable, a host of new security and risk management technologies have emerged that should be considered within the organisation.
K. K. Kumar   +4 more
semanticscholar   +1 more source

Performance Analysis of MD5 and SHA-256 Algorithms to Maintain Data Integrity

IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology, 2021
Recent advancement and increase in digitization in every dimension of life has led to increase in data leaks. It is hence very important to protect data from cyber-attacks. Cryptography is an indispensable tool which is used to maintain data integrity or
S. Prasanna, Premananda B.S Dept, of Ete
semanticscholar   +1 more source

Characterization of Md5-BAC-REV-LTR virus as Marek’s disease vaccine in commercial meat-type chickens: protection and immunosuppression

Avian Pathology, 2021
Md5-BAC-REV-LTR is a recombinant Marek’s disease virus (MDV), with an insertion of the long terminal repeat (LTR) of reticuloendotheliosis virus (REV) into the genome of the highly virulent MDV strain rMd5. It has been shown that Md5-BAC-REV-LTR does not
C. Ellington   +6 more
semanticscholar   +1 more source

iSIMP with Integrity Validation using MD5 Hash

2021 International Conference on Computational Performance Evaluation (ComPE), 2021
Communication through Internet is common now a days. Type of communication, where one need to transfer any file became vulnerable due to penetration of unknown person in network to steal the important information, it was always challenging for ...
Shiv Kumar Verma   +3 more
semanticscholar   +1 more source

MD5 Research

2010 Second International Conference on Multimedia and Information Technology, 2010
This paper describes the MD5 algorithm. It analyses the theories from program codes and sums up some current crack approaches of this algorithm. According to these crack ways, the paper brings forward the corresponding measures for improvement and adopts procedures to achieve a project to prove its ...
Zhen Ge, Zhao Yong-Xia
openaire   +2 more sources

MD5-Based Error Detection

2009 Pacific-Asia Conference on Circuits, Communications and Systems, 2009
This paper proposes one kind of MD5-based error-detecting mechanism. The 128-bit MD5 code is compressed into 16-bit error-detecting code in order to substitute for that computed with CRC or checksum. In this mechanism, computer-simulating technology is used to simulate natural and manual attacks.
Hu Ming, Wang Yan
openaire   +2 more sources

Implementasi Kriptografi Untuk Keamanan File Text Dengan Menggunakan Metode MD5

Jurnal Nasional Komputasi dan Teknologi Informasi (JNKTI), 2020
Technological developments, especially in data security systems in maintaining data information security, have developed rapidly. In maintaining the security of information data, there are branches of science in its development such as cryptography ...
Ahmad Zaki Fadilla Rangkuti, Hasan Fahmi
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy