Results 91 to 100 of about 339,481 (270)

Security Analysis of Speech Perceptual Hashing Authentication Algorithm

open access: yesInternational Journal of Security and Its Applications, 2016
Speech perceptual hashing authentication algorithm is an efficient method for content integrity authentication and identity authentication. But the algorithm becomes transparent under the principle of Kerckhoffs which makes the algorithm unsafe. In this paper, the algorithm is encrypted under the principle of Kerckhoffs to protect the security of the ...
Ren Zhan-wei   +4 more
openaire   +1 more source

Understanding the Association Between Bitcoin Mining and Environmental Sustainability in Light of the Sustainable Development Goals Through the DARDL and KRLS Methods

open access: yesSustainable Development, EarlyView.
ABSTRACT Assuring environmental sustainability is essential for the continuity of the ecosystem. Every sector of the economy has some degree of impact on environmental sustainability. The United Nations (UN)’ Sustainable Development Goals (SDGs) have placed these objectives within a broader global framework, offering a global plan aimed at ensuring ...
Ali Çelik, Metehan Özırmak
wiley   +1 more source

Short signature based on factoring problem in the standard model

open access: yesTongxin xuebao, 2011
A short signature scheme based on factoring problem in the standard model was proposed.To design this sig-nature scheme,the generic construction of fully-secure signatures from weakly-secure signatures and a chameleon hash were employed.A signature in ...
WANG Zhi-wei1, ZHANG Wei1
doaj   +2 more sources

Design and Analysis of Area and Energy Efficient Reconfigurable Cryptographic Accelerator for Securing IoT Devices

open access: yesSensors, 2022
Achieving low-cost and high-performance network security communication is necessary for Internet of Things (IoT) devices, including intelligent sensors and mobile robots.
Xvpeng Zhang   +10 more
doaj   +1 more source

Large-Scale Distributed Learning via Private On-Device Locality-Sensitive Hashing [PDF]

open access: yesarXiv, 2023
Locality-sensitive hashing (LSH) based frameworks have been used efficiently to select weight vectors in a dense hidden layer with high cosine similarity to an input, enabling dynamic pruning. While this type of scheme has been shown to improve computational training efficiency, existing algorithms require repeated randomized projection of the full ...
arxiv  

Pleco and Plectron -- Two Provably Secure Password Hashing Algorithms [PDF]

open access: yesProceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015
We propose two practical and provably secure password hashing algorithms, Pleco and Plectron. They are built upon well-understood cryptographic algorithms, and combine advantages of symmetric and asymmetric primitives. By employing the Rabin cryptosystem, we prove that the one-wayness of Pleco is at least as strong as the hard problem of integer ...
Guang Gong, Xinxin Fan, Bo Zhu
openaire   +2 more sources

Vulnerabilities and Limitations of MQTT Protocol Used between IoT Devices

open access: yesApplied Sciences, 2019
With the proliferation of smart devices capable of communicating over a network using different protocols, each year more and more successful attacks are recorded against these, underlining the necessity of developing and implementing mechanisms to ...
Dan Dinculeană, Xiaochun Cheng
doaj   +1 more source

An online algorithm for generating fractal hash chains applied to digital chains of custody [PDF]

open access: yesarXiv, 2007
This paper gives an online algorithm for generating Jakobsson's fractal hash chains. Our new algorithm compliments Jakobsson's fractal hash chain algorithm for preimage traversal since his algorithm assumes the entire hash chain is precomputed and a particular list of Ceiling(log n) hash elements or pebbles are saved.
arxiv  

Quantum security of subset cover problems [PDF]

open access: yesarXiv, 2022
The subset cover problem for $k \geq 1$ hash functions, which can be seen as an extension of the collision problem, was introduced in 2002 by Reyzin and Reyzin to analyse the security of their hash-function based signature scheme HORS. The security of many hash-based signature schemes relies on this problem or a variant of this problem (e.g.
arxiv  

Sainsc: A Computational Tool for Segmentation‐Free Analysis of In Situ Capture Data

open access: yesSmall Methods, EarlyView.
Spatially resolved transcriptomics methods can now profile the entire transcriptome, at full organism scale with nanometre resolution. Analysis frameworks that can efficiently and intuitively process the massive data generated by these methods are lacking.
Niklas Müller‐Bötticher   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy