A fast portable implementation of the Secure Hash Algorithm, III.
Kevin S. McCurley
openalex +2 more sources
Parameter Sensitivity Test and Audio Encryption Scheme Design for Multimedia Information Security
With the continuous development of information technology, multimedia information faces many security threats. To realize efficient multimedia information processing under the premise of guaranteeing information security, this research analyzes and extracts the parameters of different kinds of information in view of the fact that each of them has ...
Ming Yin, Shi Tang, Deepali
wiley +1 more source
A secure multi phase authentication protocol for cloud infrastructure using elliptic curve cryptography. [PDF]
Sivasankar R, Marikkannan M.
europepmc +1 more source
Enhanced IoT Security: Blockchain, Cryptography, and CNN Integration for Mask Detection
Security concerns have become paramount, especially with the increasing reliance on facial recognition technology for identity verification. The use of masks, while essential for health protection, poses a significant challenge for these systems, hindering accurate identification.
Imen Hagui +3 more
wiley +1 more source
The growing demand for sustainable food sources has led to increasing interest in edible insects such as house cricket (Acheta domesticus) as functional ingredients. This study evaluated the anti‐inflammatory and antioxidant potential of cricket powder–enriched (10%) durum wheat pasta subjected to a simulated gastrointestinal digestion followed by the ...
Mussa Makran +9 more
wiley +1 more source
A hybrid hash framework for post quantum secure zero knowledge identification. [PDF]
Bhadane S +3 more
europepmc +1 more source
A Secure and Robust Blockchain‐Based Medical Image Encryption Approach Using Lorenz Chaotic System
Keeping medical images confidential while transmitting is crucial, especially in an open networking environment. One effective approach is blockchain‐based encryption, which provides strong security for sensitive healthcare data. To ensure the greatest levels of medical data integrity and authenticity, our proposed scheme employs a unique Lorenz ...
Fahima Hajjej +4 more
wiley +1 more source
Data security storage and transmission framework for AI computing power platforms. [PDF]
Chen J +5 more
europepmc +1 more source
Spatiotemporal Big Data Retrieval Method Based on GeoHash Algorithm and Multimode Composite Index
With the increasing demand for multisource heterogeneous spatiotemporal data in applications such as smart cities and intelligent transportation, how to balance retrieval accuracy, multimodal adaptation, and high concurrency response has become a key issue.
Yanxin Wang, Federica Proietto
wiley +1 more source
BloomSec: Scalable and privacy-preserving searchable encryption for cloud environments. [PDF]
Khan AN +5 more
europepmc +1 more source

