Results 1 to 10 of about 153,790 (328)
US Secure Hash Algorithm 1 (SHA1) [PDF]
D. Eastlake, P. Jones
semanticscholar +3 more sources
Enhancing confidentiality and access control in electronic health record systems using a hybrid hashing blockchain framework [PDF]
Confidentiality and access control are essential to protect sensitive data, prevent cyber threats, ensure compliance, and avoid risks like identity theft.
D. Gowtham Chakravarthy +3 more
doaj +2 more sources
Securing of aes based on secure hash algorithm for image steganography
In this paper we tend to square measure handling Steganography victimization SHA-256 algorithmic program within the past we tend to used LSB algorithmic program. LSB(Least vital Bit) it's totally different results on 1bit and 2bit models .The use of additional bits affects the smoothness of image on stego image .
Kakarla Chaitanya +3 more
openaire +3 more sources
Count based Secured Hash Algorithm
This paper introduces a new approach to the Secured hash algorithm. The proposed algorithms takes the variable length input bit sequence and generate the fix length output as according to the algorithm. There are many constant values, used functions, pre-processing and hashing in SHA(1)(2)(3)(4). Here introducing new technique in which shifting of bits
Mayank Swarnkar
openaire +2 more sources
IoT Storage Optimisation Security Framework Based on a Secure Hash Algorithm
The purpose of this research is to examine the risks that IoT applications encounter throughout operational operations, data routing, and energy utilisation, as well as potential solutions to these problems utilising Blockchain technology. This study is broken up into four parts: finding a secure hash technique for the huge volumes of data produced by ...
Aditiya Agnihotri
openaire +3 more sources
Hashing algorithms – a way to secure your application
This article presents one of the mechanisms of ensuring security in applications designed in Java programming language – hashing algorithms. It describes selected elements of Java Cryptographic Architecture library. Chosen algorithms were scrutinized in terms of the security and how fast they work.
Fryze, Wiktor A +2 more
openaire +3 more sources
Integrity Authentication Based on Blockchain and Perceptual Hash for Remote-Sensing Imagery
The integrity of remote-sensing image data is susceptible to corruption during storage and transmission. Perceptual hashing is a non-destructive data integrity-protection technique suitable for high-accuracy requirements of remote-sensing image data ...
Dingjie Xu, Na Ren, Changqing Zhu
doaj +1 more source
The data breach and the integrity violation of remote data remain significant issues in the domain of information security. A provably-secure hash function aids in providing solutions to integrity-related issues.
P. Karthik +5 more
doaj +1 more source
In a mobile ad hoc network (MANET), all nodes are communicated with one another across wireless networks to create a temporary network without the support of centralised management. Due to dynamic topology in MANET, secure routing is a crucial issue. The
Anita R. Patil, Gautam M. Borkar
doaj +1 more source

