Results 101 to 110 of about 339,481 (270)
Design and evaluation of chaotic iterations based keyed hash function [PDF]
Investigating how to construct a secure hash algorithm needs in-depth study, as various existing hash functions like the MD5 algorithm have recently exposed their security flaws. At the same time, hash function based on chaotic theory has become an emerging research in the field of nonlinear information security.
arxiv
Novel One Time Signatures (NOTS): A Compact Post-Quantum Digital Signature Scheme
The future of the hash based digital signature schemes appears to be very bright in the upcoming quantum era because of the quantum threats to the number theory based digital signature schemes.
Furqan Shahid+3 more
doaj +1 more source
A Hybrid Caching Scheme with Dynamic Forwarding Strategy in Information‐Centric Network
In this era of huge data traffic, the information‐centric network (ICN) is a switching strategy from conventional host‐centric communication to a new data‐centric one. In‐network caching an integral part of ICN can reduce the shortcomings of today's location‐based internet paradigm. As ICN has limited caching capability, the decision of optimal routing
Ashim Dey+4 more
wiley +1 more source
Secure big data collection and processing: Framework, means and opportunities
Abstract Statistical disclosure control is important for the dissemination of statistical outputs. There is an increasing need for greater confidentiality protection during data collection and processing by National Statistical Offices. In particular, various transactions and remote sensing signals are examples of useful but very detailed big data that
Li‐Chun Zhang, Gustav Haraldsen
wiley +1 more source
Tightly-Secure Two-Tier Signatures on Code-Based Digital Signatures with Chameleon Hash Functions
In the current landscape where quantum algorithms pose a significant threat to conventional digital signature algorithms, code-based digital signature algorithms have emerged as the primary focus of ongoing research in post-quantum cryptography.
Yong Wang, Eddie Shahril Ismail
doaj +1 more source
HW/SW Architecture Exploration for an Efficient Implementation of the Secure Hash Algorithm SHA-256 [PDF]
Manel Kammoun+3 more
openalex +1 more source
A secured cloud‐medical data sharing with A‐BRSA and Salp ‐Ant Lion Optimisation Algorithm
Abstract Sharing medical data among healthcare providers, researchers, and patients is crucial for efficient healthcare services. Cloud‐assisted smart healthcare (s‐healthcare) systems have made it easier to store EHRs effectively. However, the traditional encryption algorithms used to secure this data can be vulnerable to attacks if the encryption key
Adel Binbusayyis+7 more
wiley +1 more source
Abstract The Internet of Things (IoT) in deploying robotic sprayers for pandemic‐associated disinfection and monitoring has garnered significant attention in recent research. The authors introduce a novel architectural framework designed to interconnect smart monitoring robotic devices within healthcare facilities using narrowband Internet of Things ...
Md Motaharul Islam+9 more
wiley +1 more source
Abstract Data is the key element that runs the modern society. Large amounts of data are being released day by day as a result of many activities. The digital data is transferred through the Internet which may be vulnerable to attacks while transmitting. Especially, the medical data is observed to be of at most importance.
Rupa Ch+4 more
wiley +1 more source
Improving Privacy and Trust in Federated Identity Using SAML with Hash Based Encryption Algorithm [PDF]
Cloud computing is an upcoming technology that has been designed for commercial needs. One of the major issues in cloud computing is the difficulty to manage federated identities and the trust between the user and the service providers. This paper focuses on how security can be provided between the user and the service provider and how the user ...
arxiv