HMAC SHA (Hashed Message Authentication Code, Secure Hash Algorithm) TSIG Algorithm Identifiers [PDF]
openaire +1 more source
Analysis of algorithms magenta with 128 bit key length accompanied by shifting hash securing data [PDF]
Riandy Yap
openalex +1 more source
Secure and scalable dual blockchain and IPFS driven IoT ecosystem for next gen healthcare systems. [PDF]
Mallick SR, Lenka RK, Sobhanayak S.
europepmc +1 more source
Research on the application of quantum-secure algorithms in 5G network
With the widespread application of 5G networks, data transmission speed and capacity have been significantly improved, promoting innovative development in fields such as the Internet of things, autonomous driving, and telemedicine.
WANG Congli +5 more
doaj
Expressive Attribute-Based Proxy Signature Scheme for UAV Networks. [PDF]
He L, Gan Y, Jin S.
europepmc +1 more source
High Performance and Reliable Fault Detection Scheme for the Secure Hash Algorithm
Fatma Kahri +3 more
openalex +2 more sources
A Secure Data Deduplication in Cloud Using Hashing and AES Algorithm
Mahajan Mayur Pradeep +3 more
openalex +1 more source
Privacy-preserving computation scheme for the maximum and minimum values of the sums of keyword-corresponding values in cross-chain data exchange. [PDF]
Liu X +9 more
europepmc +1 more source

