Results 101 to 110 of about 153,790 (328)
This research presents a blockchain‐based framework for secure and efficient medical image sharing, prioritizing data integrity and privacy. The framework involves two key phases: image compression with feature extraction and image encryption with ...
Yeasir Arafat +7 more
doaj +1 more source
Tightly-Secure Two-Tier Signatures on Code-Based Digital Signatures with Chameleon Hash Functions
In the current landscape where quantum algorithms pose a significant threat to conventional digital signature algorithms, code-based digital signature algorithms have emerged as the primary focus of ongoing research in post-quantum cryptography.
Yong Wang, Eddie Shahril Ismail
doaj +1 more source
Vulnerabilities and Limitations of MQTT Protocol Used between IoT Devices
With the proliferation of smart devices capable of communicating over a network using different protocols, each year more and more successful attacks are recorded against these, underlining the necessity of developing and implementing mechanisms to ...
Dan Dinculeană, Xiaochun Cheng
doaj +1 more source
Novel One Time Signatures (NOTS): A Compact Post-Quantum Digital Signature Scheme
The future of the hash based digital signature schemes appears to be very bright in the upcoming quantum era because of the quantum threats to the number theory based digital signature schemes.
Furqan Shahid +3 more
doaj +1 more source
TNCOA: Efficient Exploration via Observation‐Action Constraint on Trajectory‐Based Intrinsic Reward
ABSTRACT Efficient exploration is critical in handling sparse rewards and partial observability in deep reinforcement learning. However, most existing intrinsic reward methods based on novelty rely on single‐step observations or Euclidean distances.
Jingxiang Ma, Hongbin Ma, Youzhi Zhang
wiley +1 more source
APPLICATION OF THE SECURE HASHING ALGORITHM (SHA) METHOD AND ROLE-BASED ACCESS SECURITY AUTHENTICATION IN LARAVEL 7 [PDF]
Thomson Mary +2 more
openalex +1 more source
SMART PRESENSI MENGGUNAKAN QR CODE DENGAN SECURE HASH ALGORITHM 2 (SHA-2)
I Made Mahaputra Wijaya +2 more
openalex +2 more sources
Steganography in Color Animated Image Sequence for Secret Data Sharing Using Secure Hash Algorithm [PDF]
Ratan Kumar Basak +3 more
openalex +1 more source
Hardware-based Security for Virtual Trusted Platform Modules
Virtual Trusted Platform modules (TPMs) were proposed as a software-based alternative to the hardware-based TPMs to allow the use of their cryptographic functionalities in scenarios where multiple TPMs are required in a single platform, such as in ...
Alsouri, Sami +3 more
core
Abstract This study explores the practical impact of blockchain technology (BCT), which contrasts strongly with literature that has predominantly hypothesised BCT's potential to disrupt accounting practice. We interviewed 44 practitioners and academics with knowledge of BCT across 13 countries and industries.
Musbaudeen Titilope Oladejo +3 more
wiley +1 more source

