Results 121 to 130 of about 142,210 (279)

The study of the speed and statistical security of cryptographic hashing algorithms

open access: yesRadiotekhnika, 2019
Comparative studies of cryptographic hashing algorithms are being carried out, which are used (or can be applied) in modern decentralized blockchain systems. In particular, hashing speed of action is studied on different desktop systems, the number of clock cycles of the computing system per byte (Cycles / byte), the volume of the hashed message per ...
openaire   +2 more sources

Current application of blockchain technology in healthcare and its potential roles in Urology

open access: yesBJU International, EarlyView.
Objective To assess the current uses of blockchain technology in surgery and explore potential applications in urology. Methods A systematic literature review and critical appraisal was performed. The PubMed database was searched for all relevant papers published in English, between 2003 and 2023, on blockchain and surgery, and urology.
Sulleyman Felemban   +6 more
wiley   +1 more source

Analysis attackers’ methods with hashing secure password using CSPRNG and PBKDF2

open access: yesWasit Journal of Engineering Sciences
Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world.
Nada Abdul Aziz Mustafa
doaj   +1 more source

Medical Image Reliability Verification Using Hash Signatures and Sequential Square Encoding

open access: yesJournal of Intelligent Systems, 2018
Increased growth of information technology in healthcare has led to a situation where the security of patient information is more important and is a critical issue.
Ranjani J. Jennifer, Babu M.
doaj   +1 more source

LDPC and SHA based iris recognition for image authentication

open access: yesEgyptian Informatics Journal, 2012
We introduce a novel way to authenticate an image using Low Density Parity Check (LDPC) and Secure Hash Algorithm (SHA) based iris recognition method with reversible watermarking scheme, which is based on Integer Wavelet Transform (IWT) and threshold ...
K. Seetharaman, R. Ragupathy
doaj   +1 more source

Protector Control PC-AODV-BH in The Ad Hoc Networks

open access: yes, 2016
In this paper we deal with the protector control that which we used to secure AODV routing protocol in Ad Hoc networks. The considered system can be vulnerable to several attacks because of mobility and absence of infrastructure. While the disturbance is
Agoujil, S.   +3 more
core   +1 more source

Deformed tiling and blending: application to the correction of distortions implied by texture mapping

open access: yesComputer Graphics Forum, EarlyView.
Abstract The prevailing model in virtual 3D scenes is a 3D surface, which a texture is mapped onto, through a parameterization from the texture plane. We focus on accounting for the parameterization during the texture creation process, to control the deformations and remove the cuts induced by the mapping.
Q. Wendling, J. Ravaglia, B. Sauvage
wiley   +1 more source

Efficient Perspective‐Correct 3D Gaussian Splatting Using Hybrid Transparency

open access: yesComputer Graphics Forum, EarlyView.
Abstract 3D Gaussian Splats (3DGS) have proven a versatile rendering primitive, both for inverse rendering as well as real‐time exploration of scenes. In these applications, coherence across camera frames and multiple views is crucial, be it for robust convergence of a scene reconstruction or for artifact‐free fly‐throughs.
Florian Hahlbohm   +8 more
wiley   +1 more source

Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem

open access: yesSensors, 2010
Secure broadcasting is an essential feature for critical operations in wireless sensor network (WSNs). However, due to the limited resources of sensor networks, verifying the authenticity for broadcasted messages is a very difficult issue.
Eun-Suk Cho   +3 more
doaj   +1 more source

TDHA: A Timestamp Defined Hash Algorithm for Secure Data Dissemination in VANET

open access: yesProcedia Computer Science, 2016
AbstractThe safety application in vehicular ad hoc network provides active road safety to avoid road accidents by disseminating life critical information among drivers securely. Such information must be protected from the access of intruder or attacker.
Sulata Mitra, Atanu Mondal
openaire   +2 more sources

Home - About - Disclaimer - Privacy