Exploiting an HMAC-SHA-1 Optimization to Speed up PBKDF2 [PDF]
PBKDF2 [1] is a well-known password-based key derivation function. In order to slow attackers down, PBKDF2 introduces CPU-intensive operations based on an iterated pseudorandom function (in our case HMAC-SHA-1). If we are able to speed up a SHA-1 or an HMAC implementation, we are able to speed up PBKDF2-HMAC-SHA-1.
Andrea Visconti, Federico Gorla
+6 more sources
[Retracted] Digital Forensic Investigation of Healthcare Data in Cloud Computing Environment
Cloud computing is widely used in various sectors such as finance, health care, and education. Factors such as cost optimization, interoperability, data analysis, and data ownership functionalities are attracting healthcare industry to use cloud services.
Anand K. Mishra +4 more
wiley +2 more sources
SENTINEL: A Secure and Efficient Authentication Framework for Unmanned Aerial Vehicles
Extensive use of unmanned aerial vehicles (commonly referred to as a “drone”) has posed security and safety challenges. To mitigate security threats caused by flights of unauthorized drones, we present a framework called SENTINEL (Secure and Efficient ...
Geumhwan Cho +3 more
doaj +2 more sources
An image encryption scheme using PRESENT-RC4, chaos and secure key generation [PDF]
As the demand for secure visual data transmission grows, specifically concerning the areas of medical imaging, surveillance, and secure communications, image encryption has emerged as a popular research area.
Krishna Kumar +3 more
doaj +2 more sources
CryptoShield–multilayered cryptographic framework for enhanced security and robust communication systems [PDF]
Interconnected and latency-sensitive systems require cryptographic designs that deliver authenticated confidentiality with predictable cost on constrained hardware.
Muhammad Altaf +4 more
doaj +2 more sources
PKCS #5: Password-Based Key Derivation Function 2 (PBKDF2) Test Vectors [PDF]
S. Josefsson
openalex +2 more sources
Locality preserving binary face representations using auto‐encoders
Abstract Crypto‐biometric schemes, such as fuzzy commitment, require binary sources. A novel approach to binarising biometric data using Deep Neural Networks applied to facial biometric data is introduced. The binary representations are evaluated on the MOBIO and the Labelled Faces in the Wild databases, where their biometric recognition performance ...
Mohamed Amine Hmani +2 more
wiley +1 more source
NSSIA: A New Self‐Sovereign Identity Scheme with Accountability
Self‐sovereign identity (SSI) is a new distributed method for identity management, commonly used to address the problem that users are lack of control over their identities. However, the excessive pursuit of self‐sovereignty in the most existing SSI schemes hinders sanctions against attackers.
Qiuyun Lyu +6 more
wiley +1 more source
A Secure Two‐Factor Authentication Framework in Cloud Computing
Cloud computing technology has brought tremendous evaluation in the arena of IT (information technology). This technology paves the path of starting business with lowest investment by availing infrastructure as a service (IAAS), platform as a service (PAAS) and software as a service (SAAS) pay per uses model. Cloud computing services can be quickly and
Sandeep kaur +3 more
wiley +1 more source
Security Analysis and Bypass User Authentication Bound to Device of Windows Hello in the Wild
Windows Hello is a Fast IDentity Online‐ (FIDO‐) based new login system for Windows 10, which provides a single sign‐on (SSO) service to diverse online applications. Hardware protection is essential for Window Hello’s security. This paper aims to examine the security of Windows Hello on a device where hardware protection is unavailable.
Ejin Kim +2 more
wiley +1 more source

