Results 101 to 110 of about 142,210 (279)

IMPLEMENTASI DIGITAL SIGNATURE ALGORITHM (DSA) MENGGUNAKAN SECURE HASH ALGORITHM-256 (SHA-256) PADA MEDIA GAMBAR [PDF]

open access: yes, 2020
With the development of technology, documents not only produced in printed form but also produced in digital form, especially image documents. The advantage of digital documents is that they are easier and more efficient to use but digital documents are ...
Sahl Fawzy Sutopo, -
core  

A secured cloud‐medical data sharing with A‐BRSA and Salp ‐Ant Lion Optimisation Algorithm

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Sharing medical data among healthcare providers, researchers, and patients is crucial for efficient healthcare services. Cloud‐assisted smart healthcare (s‐healthcare) systems have made it easier to store EHRs effectively. However, the traditional encryption algorithms used to secure this data can be vulnerable to attacks if the encryption key
Adel Binbusayyis   +7 more
wiley   +1 more source

Pleco and Plectron -- Two Provably Secure Password Hashing Algorithms [PDF]

open access: yesProceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015
We propose two practical and provably secure password hashing algorithms, Pleco and Plectron. They are built upon well-understood cryptographic algorithms, and combine advantages of symmetric and asymmetric primitives. By employing the Rabin cryptosystem, we prove that the one-wayness of Pleco is at least as strong as the hard problem of integer ...
Guang Gong, Xinxin Fan, Bo Zhu
openaire   +2 more sources

LightChain: A DHT-based Blockchain for Resource Constrained Environments [PDF]

open access: yes, 2019
As an append-only distributed database, blockchain is utilized in a vast variety of applications including the cryptocurrency and Internet-of-Things (IoT).
Hassanzadeh-Nazarabadi, Yahya   +2 more
core   +1 more source

Enabling pandemic‐resilient healthcare: Narrowband Internet of Things and edge intelligence for real‐time monitoring

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract The Internet of Things (IoT) in deploying robotic sprayers for pandemic‐associated disinfection and monitoring has garnered significant attention in recent research. The authors introduce a novel architectural framework designed to interconnect smart monitoring robotic devices within healthcare facilities using narrowband Internet of Things ...
Md Motaharul Islam   +9 more
wiley   +1 more source

Robust steganographic framework for securing sensitive healthcare data of telemedicine using convolutional neural network

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Data is the key element that runs the modern society. Large amounts of data are being released day by day as a result of many activities. The digital data is transferred through the Internet which may be vulnerable to attacks while transmitting. Especially, the medical data is observed to be of at most importance.
Rupa Ch   +4 more
wiley   +1 more source

Vulnerabilities and Limitations of MQTT Protocol Used between IoT Devices

open access: yesApplied Sciences, 2019
With the proliferation of smart devices capable of communicating over a network using different protocols, each year more and more successful attacks are recorded against these, underlining the necessity of developing and implementing mechanisms to ...
Dan Dinculeană, Xiaochun Cheng
doaj   +1 more source

A Lightweight YOLOv5 Target Detection Model and Its Application to the Measurement of 100‐Kernel Weight of Corn Seeds

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT The 100‐kernel weight of corn seed is a crucial metric for assessing corn quality, and the current measurement means mostly involve manual counting of kernels followed by weighing on a balance, which is labour‐intensive and time‐consuming. Aiming to address the problem of low efficiency in measuring the 100‐kernel weight of corn seeds, this ...
Helong Yu   +4 more
wiley   +1 more source

Novel One Time Signatures (NOTS): A Compact Post-Quantum Digital Signature Scheme

open access: yesIEEE Access, 2020
The future of the hash based digital signature schemes appears to be very bright in the upcoming quantum era because of the quantum threats to the number theory based digital signature schemes.
Furqan Shahid   +3 more
doaj   +1 more source

Pairing-based identification schemes [PDF]

open access: yes, 2005
We propose four different identification schemes that make use of bilinear pairings, and prove their security under certain computational assumptions. Each of the schemes is more efficient and/or more secure than any known pairing-based identification ...
Freeman, David
core   +2 more sources

Home - About - Disclaimer - Privacy