Results 11 to 20 of about 339,481 (270)

Instruction sequence expressions for the secure hash algorithm SHA-256

open access: green, 2013
The secure hash function SHA-256 is a function on bit strings. This means that its restriction to the bit strings of any given length can be computed by a finite instruction sequence that contains only instructions to set and get the content of Boolean registers, forward jump instructions, and a termination instruction.
J.A. Bergstra, C.A. Middelburg
openalex   +5 more sources

Integrity Authentication Based on Blockchain and Perceptual Hash for Remote-Sensing Imagery

open access: yesRemote Sensing, 2023
The integrity of remote-sensing image data is susceptible to corruption during storage and transmission. Perceptual hashing is a non-destructive data integrity-protection technique suitable for high-accuracy requirements of remote-sensing image data ...
Dingjie Xu, Na Ren, Changqing Zhu
doaj   +1 more source

Node authentication and encrypted data transmission in mobile ad hoc network using the swarm intelligence‐based secure ad‐hoc on‐demand distance vector algorithm

open access: yesIET Wireless Sensor Systems, 2023
In a mobile ad hoc network (MANET), all nodes are communicated with one another across wireless networks to create a temporary network without the support of centralised management. Due to dynamic topology in MANET, secure routing is a crucial issue. The
Anita R. Patil, Gautam M. Borkar
doaj   +1 more source

Implementation of a Secure Storage Using Blockchain for PCA-FRF Sensor Data of Plate-Like Structures

open access: yesIEEE Access, 2022
Structural Health Monitoring (SHM) systems have widely been used to guarantee the safe functioning of electrical, mechanical, civil, and aerospace engineering assets.
Meisam Gordan   +5 more
doaj   +1 more source

Insights into molecular cluster materials with adamantane‐like core structures by considering dimer interactions

open access: yesJournal of Computational Chemistry, Volume 44, Issue 7, Page 843-856, March 15, 2023., 2023
Abstract A class of adamantane‐like molecular materials attracts attention because they exhibit an extreme non‐linear optical response and emit a broad white‐light spectrum after illumination with a continuous‐wave infrared laser source. According to recent studies, not only the nature of the cluster molecules, but also the macroscopic structure of the
Sebastian Schwan   +7 more
wiley   +1 more source

Efficient space‐time adaptivity for parabolic evolution equations using wavelets in time and finite elements in space

open access: yesNumerical Linear Algebra with Applications, Volume 30, Issue 1, January 2023., 2023
Abstract Considering the space‐time adaptive method for parabolic evolution equations we introduced in Stevenson et al., this work discusses an implementation of the method in which every step is of linear complexity. Exploiting the tensor‐product structure of the space‐time cylinder, the method allows for a family of trial spaces given as spans of ...
Raymond van Venetië, Jan Westerdiep
wiley   +1 more source

Blockchain and cloud computing-based secure electronic healthcare records storage and sharing

open access: yesFrontiers in Public Health, 2022
Healthcare information is essential for both service providers and patients. Further secure sharing and maintenance of Electronic Healthcare Records (EHR) are imperative.
Amna Amanat   +6 more
doaj   +1 more source

An Improved Fast and Secure Hash Algorithm [PDF]

open access: yesJournal of Information Processing Systems, 2012
Abstract —Recently, a fast and secure hash function SFHA – 256 has been proposed and claimed as more secure and as having a better performance than the SHA – 256. In this paper an improved version of SFHA – 256 is proposed and analyzed using two parameters, namely the avalanche effect and uniform deviation. The experimental results and further analysis
Abhinav Rungta   +4 more
openaire   +2 more sources

High Throughput Implementation of the Keccak Hash Function Using the Nios-II Processor

open access: yesTechnologies, 2020
Presently, cryptographic hash functions play a critical role in many applications, such as digital signature systems, security communications, protocols, and network security infrastructures.
Argyrios Sideris   +2 more
doaj   +1 more source

Semantic-Aware Adversarial Training for Reliable Deep Hashing Retrieval [PDF]

open access: yesIEEE Transactions on Information Forensics and Security, vol. 18, pp. 4681-4694, 2023, 2023
Deep hashing has been intensively studied and successfully applied in large-scale image retrieval systems due to its efficiency and effectiveness. Recent studies have recognized that the existence of adversarial examples poses a security threat to deep hashing models, that is, adversarial vulnerability. Notably, it is challenging to efficiently distill
arxiv   +1 more source

Home - About - Disclaimer - Privacy