Results 101 to 110 of about 339,481 (270)

Design and evaluation of chaotic iterations based keyed hash function [PDF]

open access: yesarXiv, 2017
Investigating how to construct a secure hash algorithm needs in-depth study, as various existing hash functions like the MD5 algorithm have recently exposed their security flaws. At the same time, hash function based on chaotic theory has become an emerging research in the field of nonlinear information security.
arxiv  

Novel One Time Signatures (NOTS): A Compact Post-Quantum Digital Signature Scheme

open access: yesIEEE Access, 2020
The future of the hash based digital signature schemes appears to be very bright in the upcoming quantum era because of the quantum threats to the number theory based digital signature schemes.
Furqan Shahid   +3 more
doaj   +1 more source

A Hybrid Caching Scheme with Dynamic Forwarding Strategy in Information‐Centric Network

open access: yesIEEJ Transactions on Electrical and Electronic Engineering, EarlyView.
In this era of huge data traffic, the information‐centric network (ICN) is a switching strategy from conventional host‐centric communication to a new data‐centric one. In‐network caching an integral part of ICN can reduce the shortcomings of today's location‐based internet paradigm. As ICN has limited caching capability, the decision of optimal routing
Ashim Dey   +4 more
wiley   +1 more source

Secure big data collection and processing: Framework, means and opportunities

open access: yesJournal of the Royal Statistical Society: Series A (Statistics in Society), Volume 185, Issue 4, Page 1541-1559, October 2022., 2022
Abstract Statistical disclosure control is important for the dissemination of statistical outputs. There is an increasing need for greater confidentiality protection during data collection and processing by National Statistical Offices. In particular, various transactions and remote sensing signals are examples of useful but very detailed big data that
Li‐Chun Zhang, Gustav Haraldsen
wiley   +1 more source

Tightly-Secure Two-Tier Signatures on Code-Based Digital Signatures with Chameleon Hash Functions

open access: yesMathematics
In the current landscape where quantum algorithms pose a significant threat to conventional digital signature algorithms, code-based digital signature algorithms have emerged as the primary focus of ongoing research in post-quantum cryptography.
Yong Wang, Eddie Shahril Ismail
doaj   +1 more source

A secured cloud‐medical data sharing with A‐BRSA and Salp ‐Ant Lion Optimisation Algorithm

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Sharing medical data among healthcare providers, researchers, and patients is crucial for efficient healthcare services. Cloud‐assisted smart healthcare (s‐healthcare) systems have made it easier to store EHRs effectively. However, the traditional encryption algorithms used to secure this data can be vulnerable to attacks if the encryption key
Adel Binbusayyis   +7 more
wiley   +1 more source

Enabling pandemic‐resilient healthcare: Narrowband Internet of Things and edge intelligence for real‐time monitoring

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract The Internet of Things (IoT) in deploying robotic sprayers for pandemic‐associated disinfection and monitoring has garnered significant attention in recent research. The authors introduce a novel architectural framework designed to interconnect smart monitoring robotic devices within healthcare facilities using narrowband Internet of Things ...
Md Motaharul Islam   +9 more
wiley   +1 more source

Robust steganographic framework for securing sensitive healthcare data of telemedicine using convolutional neural network

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Data is the key element that runs the modern society. Large amounts of data are being released day by day as a result of many activities. The digital data is transferred through the Internet which may be vulnerable to attacks while transmitting. Especially, the medical data is observed to be of at most importance.
Rupa Ch   +4 more
wiley   +1 more source

Improving Privacy and Trust in Federated Identity Using SAML with Hash Based Encryption Algorithm [PDF]

open access: yesarXiv, 2018
Cloud computing is an upcoming technology that has been designed for commercial needs. One of the major issues in cloud computing is the difficulty to manage federated identities and the trust between the user and the service providers. This paper focuses on how security can be provided between the user and the service provider and how the user ...
arxiv  

Home - About - Disclaimer - Privacy