Results 21 to 30 of about 166,374 (227)
Issuing Digital Signatures for Integrity and Authentication of Digital Documents
In this paper, we developed a secure system for issuing digital signature for digital documents and certificates using message digest algorithm (MD5). The developed system is providing the integrity and authentication for certificates by combining the ...
Hassan Kassim Albahadily +3 more
doaj +1 more source
SHA-1 and MD5 Cryptographic Hash Functions: Security Overview
Despite their obsolescence and recommendations they are phased out from production environment, MD5 and SHA-1 cryptographic hash functions remain defaults frequently offered in many applications, e.g., database managers.
Roman Jasek
doaj +1 more source
Criptografía y seguridad en M-COMMERCE
El presente trabajo analiza los parámetros de seguridad más utilizados en el comercio electrónico realizado a través de dispositivos móviles (m-commerce), dentro de este se hace referencia a los tipos de cifrados que se usan con el fin de precautelar la ...
Cristhian Romero Romero +2 more
doaj +1 more source
FPGA Design and Implementation of Data Covering Based on MD5 Algorithm [PDF]
The protection of information leads to protection of individual privacy for everyone. This protection is performed using encryption. Many types of encryption may be utilized while the simplest one is the covering of information.
Thamir R. Saeed
doaj +1 more source
Multi-aspect, robust, and memory exclusive guest os fingerprinting [PDF]
Precise fingerprinting of an operating system (OS) is critical to many security and forensics applications in the cloud, such as virtual machine (VM) introspection, penetration testing, guest OS administration, kernel dump analysis, and memory forensics.
Fu, Y, Gu, Y, Lin, Z, Prakash, A, Yin, H
core +1 more source
SHA512 and MD5 Algorithm Vulnerability Testing Using Common Vulnerability Scoring System (CVSS)
This paper discusses the comparison of the results of testing the OTP (One Time Password) algorithm on two encryptions, namely SHA512 and MD5 which are applied to the Reconciliation Application of the Dinas Pemberdayaan Masyarakat dan Desa Kabupaten ...
Fahmi Basya +2 more
doaj +1 more source
A Novel String Distance Function based on Most Frequent K Characters [PDF]
This study aims to publish a novel similarity metric to increase the speed of comparison operations. Also the new metric is suitable for distance-based operations among strings.
Altun, Oguz +3 more
core +1 more source
Architecture based on MD5 and MD5-512 Bit Applications
Researchers have found many flaws in hash function such as MD5 algorithm. It has been one of the most widely used hash algorithm and it has been indicated that there is a security threat in the algorithm. Furthermore, a MD5 hash output may not offer sufficient protection in the near future.
V. K Mishra, Vandana Pandey
openaire +1 more source
Performance analysis of MD5 [PDF]
MD5 is an authentication algorithm proposed as the required implementation of the authentication option in IPv6. This paper presents an analysis of the speed at which MD5 can be implemented in software and hardware, and discusses whether its use interferes with high bandwidth networking.
openaire +1 more source
Computation of periodic solution bifurcations in ODEs using bordered systems [PDF]
We consider numerical methods for the computation and continuation of the three generic secondary periodic solution bifurcations in autonomous ODEs, namely the fold, the period-doubling (or flip) bifurcation, and the torus (or Neimark–Sacker) bifurcation.
Doedel, E. J. +2 more
core +2 more sources

