Results 81 to 90 of about 160,083 (235)

A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC) model for cloud‐IoT security

open access: yesExpert Systems, Volume 42, Issue 1, January 2025.
Abstract The most important and difficult challenge the digital society has recently faced is ensuring data privacy and security in cloud‐based Internet of Things (IoT) technologies. As a result, many researchers believe that the blockchain's Distributed Ledger Technology (DLT) is a good choice for various clever applications.
Shitharth Selvarajan   +5 more
wiley   +1 more source

K-theory for the Leaf Space of Foliations Formed by the Generic K-orbits of a class of Solvable Real Lie Groups [PDF]

open access: yesarXiv, 2014
The paper is a continuation of the works [17] of Vu and Shum, [18] and [19] of Vu and Hoa. In [17], Vu and Shum classified all the MD5-algebras having commutative derived ideals. In [18], Vu and Hoa considered foliations formed by the maximal dimensional K-orbits (for short, MD5-foliations) of connected MD5-groups such that their Lie algebras have 4 ...
arxiv  

Public Key Infrastructure based on Authentication of Media Attestments [PDF]

open access: yes, 2013
Many users would prefer the privacy of end-to-end encryption in their online communications if it can be done without significant inconvenience. However, because existing key distribution methods cannot be fully trusted enough for automatic use, key ...
Heinrich, Stuart
core  

Development of One‐Part Alkali‐Activated Mortar Using Foundry Waste Sand

open access: yesAdvances in Civil Engineering, Volume 2025, Issue 1, 2025.
Foundry waste sand (FWS) refers to sand that is no longer useful after being utilized in metal casting processes. This sand is produced at a rate of around 0.6 tons per 1 ton of foundry industry manufactured and is typically discarded in landfills. To provide a sustainable solid waste management solution and reuse of the FWS, a study was conducted to ...
Manoj Wankhede   +2 more
wiley   +1 more source

Wpływ zastosowania programowania równoległego na wydajność algorytmów kryptograficznych

open access: yesJournal of Computer Sciences Institute, 2016
W artykule zostały porównane możliwości zrównoleglenia dwóch algorytmów z dziedziny kryptografii: szyfrowania XOR oraz wyszukiwania kolizji funkcji skrótu MD5.
Mateusz Kraska, Piotr Kozieł
doaj   +1 more source

On a Subclass of 5-Dimensional Solvable Lie Algebras Which Have 3-Dimensional Commutative Derived Ideal [PDF]

open access: yesarXiv, 2006
The paper presents a subclass of the class of MD5-algebras and MD5-groups, i.e., five dimensional solvable Lie algebras and Lie groups such that their orbits in the co-adjoint representation (K-orbit) are orbit of zero or maximal dimension. The main results of the paper is the classification up to an isomorphism of all MD5-algebras $\mathcal{G}$ with ...
arxiv  

Selection of EAP-authentication methods in WLANs [PDF]

open access: yes, 2007
IEEE 802.1X is a key part of IEEE802.11i. By employing Extensible Authentication Protocol (EAP) it supports a variety of upper layer authentication methods each with different benefits and drawbacks.
Ali, KM, Owens, TJ
core  

Improved Collision Attack on Hash Function MD5 [PDF]

open access: yesJournal of Computer Science and Technology, 2007
In this paper, we present a fast attack algorithm to find two-block collision of hash function MD5. The algorithm is based on the two-block collision differential path of MD5 that was presented by Wang et al. in the Conference EUROCRYPT 2005. We found that the derived conditions for the desired collision differential path were not sufficient to ...
Xuejia Lai, Jie Liang
openaire   +2 more sources

A New Image Encryption Method Using an Optimized Smart Codebook

open access: yesHuman Behavior and Emerging Technologies, Volume 2025, Issue 1, 2025.
Information attacks have increased worldwide as more information is available in digital form. Image encryption is essential to prevent attackers from unauthorized access to confidential images. In this paper, we introduce a novel image encryption method called the smart codebook, which combines an intelligent codebook technique with the RSA (Rivest ...
Rami Sihwail   +2 more
wiley   +1 more source

Classification of 5-Dimensional MD-Algebras Having Non-Commutative Derived Ideals [PDF]

open access: yesarXiv, 2011
The paper presents a subclass of the class of MD5-algebras and MD5-groups, i.e. five dimensional solvable Lie algebras and Lie groups such that their orbits in the co-adjoint representation (K-orbits) are orbits of zero or maximal dimension. The main result of the paper is the classification up to an isomorphism of all MD5-algebras with the non ...
arxiv  

Home - About - Disclaimer - Privacy