Results 101 to 110 of about 153,790 (328)

Decentralized Medical Image Sharing: A Blockchain Based Approach with Subject Sensitive Hashing for Enhanced Privacy and Integrity

open access: yesIET Blockchain
This research presents a blockchain‐based framework for secure and efficient medical image sharing, prioritizing data integrity and privacy. The framework involves two key phases: image compression with feature extraction and image encryption with ...
Yeasir Arafat   +7 more
doaj   +1 more source

Tightly-Secure Two-Tier Signatures on Code-Based Digital Signatures with Chameleon Hash Functions

open access: yesMathematics
In the current landscape where quantum algorithms pose a significant threat to conventional digital signature algorithms, code-based digital signature algorithms have emerged as the primary focus of ongoing research in post-quantum cryptography.
Yong Wang, Eddie Shahril Ismail
doaj   +1 more source

Vulnerabilities and Limitations of MQTT Protocol Used between IoT Devices

open access: yesApplied Sciences, 2019
With the proliferation of smart devices capable of communicating over a network using different protocols, each year more and more successful attacks are recorded against these, underlining the necessity of developing and implementing mechanisms to ...
Dan Dinculeană, Xiaochun Cheng
doaj   +1 more source

Novel One Time Signatures (NOTS): A Compact Post-Quantum Digital Signature Scheme

open access: yesIEEE Access, 2020
The future of the hash based digital signature schemes appears to be very bright in the upcoming quantum era because of the quantum threats to the number theory based digital signature schemes.
Furqan Shahid   +3 more
doaj   +1 more source

TNCOA: Efficient Exploration via Observation‐Action Constraint on Trajectory‐Based Intrinsic Reward

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Efficient exploration is critical in handling sparse rewards and partial observability in deep reinforcement learning. However, most existing intrinsic reward methods based on novelty rely on single‐step observations or Euclidean distances.
Jingxiang Ma, Hongbin Ma, Youzhi Zhang
wiley   +1 more source

SMART PRESENSI MENGGUNAKAN QR CODE DENGAN SECURE HASH ALGORITHM 2 (SHA-2)

open access: bronze, 2021
I Made Mahaputra Wijaya   +2 more
openalex   +2 more sources

Steganography in Color Animated Image Sequence for Secret Data Sharing Using Secure Hash Algorithm [PDF]

open access: green, 2021
Ratan Kumar Basak   +3 more
openalex   +1 more source

Hardware-based Security for Virtual Trusted Platform Modules

open access: yes, 2013
Virtual Trusted Platform modules (TPMs) were proposed as a software-based alternative to the hardware-based TPMs to allow the use of their cryptographic functionalities in scenarios where multiple TPMs are required in a single platform, such as in ...
Alsouri, Sami   +3 more
core  

Blockchain technology disruptions: Exploring accounting and auditing academics and practitioners' perception

open access: yesAccounting &Finance, EarlyView.
Abstract This study explores the practical impact of blockchain technology (BCT), which contrasts strongly with literature that has predominantly hypothesised BCT's potential to disrupt accounting practice. We interviewed 44 practitioners and academics with knowledge of BCT across 13 countries and industries.
Musbaudeen Titilope Oladejo   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy