Results 151 to 160 of about 153,790 (328)

Secure Hash Algorithm SHA-3 [PDF]

open access: yesDatenschutz und Datensicherheit - DuD, 2013
openaire   +1 more source

EVOLUTION AND ANALYSIS OF SECURED HASH ALGORITHM (SHA) FAMILY

open access: diamond, 2022
Burhan Ul Islam Khan   +5 more
openalex   +2 more sources

Revisiting the Security of the Lightweight Stream Cipher Draco: New Observation and TMDTO Attacks

open access: yesIET Information Security, Volume 2026, Issue 1, 2026.
Draco is a lightweight small‐state stream cipher proposed in 2022. It is designed to provide a 128‐bit security level and be provably secure against time‐memory‐data trade‐off (TMDTO) attacks. In this paper, we revisit the security of Draco against TMDTO attacks.
Ziyu Guan   +5 more
wiley   +1 more source

MA‐LCPPA: A Multi‐Aggregator Lattice‐Based Conditional Privacy‐Preserving Authentication Scheme for Scalable and Quantum‐Secure VANETs

open access: yesIET Intelligent Transport Systems, Volume 20, Issue 1, January/December 2026.
This paper addresses the limitations of existing conditional privacy‐preserving authentication (CPPA) schemes in vehicular ad hoc networks (VANETs), which are either computationally heavy or vulnerable to quantum attacks. It proposes a multi‐aggregator lattice‐based CPPA (MA‐LCPPA) framework that distributes verification across multiple roadside units ...
Adi El‐Dalahmeh, Jie Li
wiley   +1 more source

Secured e-payment system based on automated authentication data and iterated salted hash algorithm

open access: diamond, 2020
Ali Al Farawn   +3 more
openalex   +2 more sources

Short‐Term Load Forecasting of Multi‐Energy in Integrated Energy System Based on Efficient Information Extracting Informer

open access: yesIET Renewable Power Generation, Volume 20, Issue 1, January/December 2026.
To enhance multi‐energy load forecasting accuracy crucial for Integrated Energy System (IES) planning and control, this study proposes the EI2 (Efficient Information Extracting Informer) model. This transformer‐based approach features a shared encoder, incorporates high‐dimensional MLP layers in encoder/decoder feed‐forward networks for deeper pattern ...
Tianlu Gao   +7 more
wiley   +1 more source

Directed Acyclic Graph‐Based Blockchain Performance Analysis and Its Secure Operation in Opportunistic Networks

open access: yesIET Software, Volume 2026, Issue 1, 2026.
Directed acyclic graph (DAG)‐based blockchain is a promising paradigm of a blockchain system. During DAG‐based consensus processes, nodes generate blocks in parallel, as well as voting YES on the previous blocks. It makes the DAG‐based blockchain a performance advantage in terms of confirmation delay and transaction throughput.
Ruilin Lai   +6 more
wiley   +1 more source

Design and Development of a Blockchain‐Enabled Decentralized Framework for Academic Microcredentials

open access: yesIET Software, Volume 2026, Issue 1, 2026.
Traditional higher education faces significant challenges, including rising costs, inflexibility, and a disconnect from workforce demands, while current credentialing systems are often centralized and vulnerable to fraud. Microcredentials have emerged as a solution, yet they lack integration into formal degree pathways and face issues with recognition ...
Abrar Mahbub Tanim   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy