Results 91 to 100 of about 339,481 (270)
Security Analysis of Speech Perceptual Hashing Authentication Algorithm
Speech perceptual hashing authentication algorithm is an efficient method for content integrity authentication and identity authentication. But the algorithm becomes transparent under the principle of Kerckhoffs which makes the algorithm unsafe. In this paper, the algorithm is encrypted under the principle of Kerckhoffs to protect the security of the ...
Ren Zhan-wei+4 more
openaire +1 more source
ABSTRACT Assuring environmental sustainability is essential for the continuity of the ecosystem. Every sector of the economy has some degree of impact on environmental sustainability. The United Nations (UN)’ Sustainable Development Goals (SDGs) have placed these objectives within a broader global framework, offering a global plan aimed at ensuring ...
Ali Çelik, Metehan Özırmak
wiley +1 more source
Short signature based on factoring problem in the standard model
A short signature scheme based on factoring problem in the standard model was proposed.To design this sig-nature scheme,the generic construction of fully-secure signatures from weakly-secure signatures and a chameleon hash were employed.A signature in ...
WANG Zhi-wei1, ZHANG Wei1
doaj +2 more sources
Achieving low-cost and high-performance network security communication is necessary for Internet of Things (IoT) devices, including intelligent sensors and mobile robots.
Xvpeng Zhang+10 more
doaj +1 more source
Large-Scale Distributed Learning via Private On-Device Locality-Sensitive Hashing [PDF]
Locality-sensitive hashing (LSH) based frameworks have been used efficiently to select weight vectors in a dense hidden layer with high cosine similarity to an input, enabling dynamic pruning. While this type of scheme has been shown to improve computational training efficiency, existing algorithms require repeated randomized projection of the full ...
arxiv
Pleco and Plectron -- Two Provably Secure Password Hashing Algorithms [PDF]
We propose two practical and provably secure password hashing algorithms, Pleco and Plectron. They are built upon well-understood cryptographic algorithms, and combine advantages of symmetric and asymmetric primitives. By employing the Rabin cryptosystem, we prove that the one-wayness of Pleco is at least as strong as the hard problem of integer ...
Guang Gong, Xinxin Fan, Bo Zhu
openaire +2 more sources
Vulnerabilities and Limitations of MQTT Protocol Used between IoT Devices
With the proliferation of smart devices capable of communicating over a network using different protocols, each year more and more successful attacks are recorded against these, underlining the necessity of developing and implementing mechanisms to ...
Dan Dinculeană, Xiaochun Cheng
doaj +1 more source
An online algorithm for generating fractal hash chains applied to digital chains of custody [PDF]
This paper gives an online algorithm for generating Jakobsson's fractal hash chains. Our new algorithm compliments Jakobsson's fractal hash chain algorithm for preimage traversal since his algorithm assumes the entire hash chain is precomputed and a particular list of Ceiling(log n) hash elements or pebbles are saved.
arxiv
Quantum security of subset cover problems [PDF]
The subset cover problem for $k \geq 1$ hash functions, which can be seen as an extension of the collision problem, was introduced in 2002 by Reyzin and Reyzin to analyse the security of their hash-function based signature scheme HORS. The security of many hash-based signature schemes relies on this problem or a variant of this problem (e.g.
arxiv
Sainsc: A Computational Tool for Segmentation‐Free Analysis of In Situ Capture Data
Spatially resolved transcriptomics methods can now profile the entire transcriptome, at full organism scale with nanometre resolution. Analysis frameworks that can efficiently and intuitively process the massive data generated by these methods are lacking.
Niklas Müller‐Bötticher+3 more
wiley +1 more source