Results 121 to 130 of about 142,210 (279)
The study of the speed and statistical security of cryptographic hashing algorithms
Comparative studies of cryptographic hashing algorithms are being carried out, which are used (or can be applied) in modern decentralized blockchain systems. In particular, hashing speed of action is studied on different desktop systems, the number of clock cycles of the computing system per byte (Cycles / byte), the volume of the hashed message per ...
openaire +2 more sources
Current application of blockchain technology in healthcare and its potential roles in Urology
Objective To assess the current uses of blockchain technology in surgery and explore potential applications in urology. Methods A systematic literature review and critical appraisal was performed. The PubMed database was searched for all relevant papers published in English, between 2003 and 2023, on blockchain and surgery, and urology.
Sulleyman Felemban+6 more
wiley +1 more source
Analysis attackers’ methods with hashing secure password using CSPRNG and PBKDF2
Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world.
Nada Abdul Aziz Mustafa
doaj +1 more source
Medical Image Reliability Verification Using Hash Signatures and Sequential Square Encoding
Increased growth of information technology in healthcare has led to a situation where the security of patient information is more important and is a critical issue.
Ranjani J. Jennifer, Babu M.
doaj +1 more source
LDPC and SHA based iris recognition for image authentication
We introduce a novel way to authenticate an image using Low Density Parity Check (LDPC) and Secure Hash Algorithm (SHA) based iris recognition method with reversible watermarking scheme, which is based on Integer Wavelet Transform (IWT) and threshold ...
K. Seetharaman, R. Ragupathy
doaj +1 more source
Protector Control PC-AODV-BH in The Ad Hoc Networks
In this paper we deal with the protector control that which we used to secure AODV routing protocol in Ad Hoc networks. The considered system can be vulnerable to several attacks because of mobility and absence of infrastructure. While the disturbance is
Agoujil, S.+3 more
core +1 more source
Abstract The prevailing model in virtual 3D scenes is a 3D surface, which a texture is mapped onto, through a parameterization from the texture plane. We focus on accounting for the parameterization during the texture creation process, to control the deformations and remove the cuts induced by the mapping.
Q. Wendling, J. Ravaglia, B. Sauvage
wiley +1 more source
Efficient Perspective‐Correct 3D Gaussian Splatting Using Hybrid Transparency
Abstract 3D Gaussian Splats (3DGS) have proven a versatile rendering primitive, both for inverse rendering as well as real‐time exploration of scenes. In these applications, coherence across camera frames and multiple views is crucial, be it for robust convergence of a scene reconstruction or for artifact‐free fly‐throughs.
Florian Hahlbohm+8 more
wiley +1 more source
Secure broadcasting is an essential feature for critical operations in wireless sensor network (WSNs). However, due to the limited resources of sensor networks, verifying the authenticity for broadcasted messages is a very difficult issue.
Eun-Suk Cho+3 more
doaj +1 more source
TDHA: A Timestamp Defined Hash Algorithm for Secure Data Dissemination in VANET
AbstractThe safety application in vehicular ad hoc network provides active road safety to avoid road accidents by disseminating life critical information among drivers securely. Such information must be protected from the access of intruder or attacker.
Sulata Mitra, Atanu Mondal
openaire +2 more sources