Results 271 to 280 of about 75,500 (332)
A ZKP-based anonymous biometric authentication scheme for the E-health systems. [PDF]
Mao X, Zhou X, Zhao X, Chen Y.
europepmc +1 more source
Automatic dependent surveillance-broadcast (ADS-B) anomalous messages and attack type detection: deep learning-based architecture. [PDF]
Ahmed W +3 more
europepmc +1 more source
RiceChain-Plus: an enhanced framework for blockchain-based rice supply chain systems-ensuring security, privacy, and efficiency. [PDF]
Yakubu BM +2 more
europepmc +1 more source
Lightweight data protection framework for secure edge transmission using IOTA-MAM. [PDF]
Lu F, Huang H, Cai Z, Chen J.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Approximate image message authentication codes
IEEE Transactions on Multimedia, 2001This paper introduces approximate image message authentication codes (IMACs) for soft image authentication. The proposed approximate IMAC survives small to moderate image compression and it is capable of detecting and locating tampering. Techniques such as block averaging and smoothing, parallel approximate message authentication code (AMAC ...
null Liehua Xie +2 more
openaire +1 more source
QR Code Authentication with Embedded Message Authentication Code
Mobile Networks and Applications, 2016Quick Response (QR) code is widely used nowadays but its authenticity is an open issue. Attackers can easily replace the original barcode by a modified one which is generated through the standard encoder. This paper proposes to embed the authentication data such as message authentication code and cryptographic signature for QR code authentication.
openaire +1 more source
Message Authentication Codes (MACs)
2010A Message Authentication Code (MAC), also known as a cryptographic checksum or a keyed hash function, is widely used in practice. In terms of security functionality, MACs share some properties with digital signatures, since they also provide message integrity and message authentication. However, unlike digital signatures, MACs are symmetric-key schemes
Christof Paar, Jan Pelzl
openaire +1 more source
A Privacy Preserving Message Authentication Code
2015 5th International Conference on IT Convergence and Security (ICITCS), 2015In this paper, we propose a new message authentication code which can preserve privacy of data. The proposed mechanism supports to verify data integrity from only partly information of the original data. In addition, it is proved to be chosen-message-attack secure and privacy-preserving.
Dang Hai Van, Nguyen Dinh Thuc
openaire +1 more source
Updatable Signatures and Message Authentication Codes
2021Cryptographic objects with updating capabilities have been proposed by Bellare, Goldreich and Goldwasser (CRYPTO’94) under the umbrella of incremental cryptography. They have recently seen increased interest, motivated by theoretical questions (Ananth et al., EC’17) as well as concrete practical motivations (Lehmann et al., EC’18; Groth et al.
Cini, Valerio +4 more
openaire +1 more source

