Results 1 to 10 of about 153,790 (328)

Enhancing confidentiality and access control in electronic health record systems using a hybrid hashing blockchain framework [PDF]

open access: yesScientific Reports
Confidentiality and access control are essential to protect sensitive data, prevent cyber threats, ensure compliance, and avoid risks like identity theft.
D. Gowtham Chakravarthy   +3 more
doaj   +2 more sources

Securing of aes based on secure hash algorithm for image steganography

open access: diamondInternational journal of health sciences, 2022
In this paper we tend to square measure handling Steganography victimization SHA-256 algorithmic program within the past we tend to used LSB algorithmic program. LSB(Least vital Bit) it's totally different results on 1bit and 2bit models .The use of additional bits affects the smoothness of image on stego image .
Kakarla Chaitanya   +3 more
openaire   +3 more sources

Count based Secured Hash Algorithm

open access: bronzeIOSR Journal of Computer Engineering, 2012
This paper introduces a new approach to the Secured hash algorithm. The proposed algorithms takes the variable length input bit sequence and generate the fix length output as according to the algorithm. There are many constant values, used functions, pre-processing and hashing in SHA(1)(2)(3)(4). Here introducing new technique in which shifting of bits
Mayank Swarnkar
openaire   +2 more sources

IoT Storage Optimisation Security Framework Based on a Secure Hash Algorithm

open access: diamondTurkish Journal of Computer and Mathematics Education (TURCOMAT), 2018
The purpose of this research is to examine the risks that IoT applications encounter throughout operational operations, data routing, and energy utilisation, as well as potential solutions to these problems utilising Blockchain technology. This study is broken up into four parts: finding a secure hash technique for the huge volumes of data produced by ...
Aditiya Agnihotri
openaire   +3 more sources

Hashing algorithms – a way to secure your application

open access: green, 2008
This article presents one of the mechanisms of ensuring security in applications designed in Java programming language – hashing algorithms. It describes selected elements of Java Cryptographic Architecture library. Chosen algorithms were scrutinized in terms of the security and how fast they work.
Fryze, Wiktor A   +2 more
openaire   +3 more sources

Integrity Authentication Based on Blockchain and Perceptual Hash for Remote-Sensing Imagery

open access: yesRemote Sensing, 2023
The integrity of remote-sensing image data is susceptible to corruption during storage and transmission. Perceptual hashing is a non-destructive data integrity-protection technique suitable for high-accuracy requirements of remote-sensing image data ...
Dingjie Xu, Na Ren, Changqing Zhu
doaj   +1 more source

A novel subset-based polynomial design for enhancing the security of short message-digest with inflated avalanche and random responses

open access: yesJournal of King Saud University: Computer and Information Sciences, 2023
The data breach and the integrity violation of remote data remain significant issues in the domain of information security. A provably-secure hash function aids in providing solutions to integrity-related issues.
P. Karthik   +5 more
doaj   +1 more source

Node authentication and encrypted data transmission in mobile ad hoc network using the swarm intelligence‐based secure ad‐hoc on‐demand distance vector algorithm

open access: yesIET Wireless Sensor Systems, 2023
In a mobile ad hoc network (MANET), all nodes are communicated with one another across wireless networks to create a temporary network without the support of centralised management. Due to dynamic topology in MANET, secure routing is a crucial issue. The
Anita R. Patil, Gautam M. Borkar
doaj   +1 more source

Home - About - Disclaimer - Privacy