Results 231 to 240 of about 142,210 (279)
A secure and trustworthy blockchain-assisted edge computing architecture for industrial internet of things. [PDF]
Asaithambi S+5 more
europepmc +1 more source
A Blockchain Parallel Activity Architecture with Social Network Graphs as Carriers for Internet of Things Networks. [PDF]
Cong X, Zi L.
europepmc +1 more source
The application of blockchain technology in data trading: a systematic review. [PDF]
Xiong W, Shao H, Ge H.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Secure Hash Algorithm based on Efficient Chaotic Neural Network
2016 International Conference on Communications (COMM), 2016Secure Hash Algorithm (SHA) is the most popularstandard of Hash functions. Several security protocols useSHA to provide message integrity, authentication and digitalsignature. Nowadays, a new technology based on Chaotic NeuralNetwork is used to design Hash functions due to the followingimportant properties of Neural Networks: non-linearity,compression,
Abdoun, Nabil+5 more
openaire +4 more sources
Implementation of Enhanced Secure Hash Algorithm Towards a Secured Web Portal
2019 IEEE 4th International Conference on Computer and Communication Systems (ICCCS), 2019In this paper, the application of the enhanced secure hash algorithm-512 is implemented on web applications specifically in password hashing. In addition to the enhancement of hash function, hill cipher is included for the salt generation to increase the complexity of generating hash tables that may be used as an attack on the algorithm. The testing of
Froilan E. De Guzman+2 more
openaire +3 more sources
Enhanced Secure Hash Algorithm-512 based on Quadratic Function
2018 IEEE 10th International Conference on Humanoid, Nanotechnology, Information Technology,Communication and Control, Environment and Management (HNICEM), 2018This paper attempts to introduce the enhanced SHA-1 algorithm which features a simple quadratic function that will control the selection of primitive function and constant used per round of SHA-1. The message digest for this enhancement is designed for 512 hashed value that will answer the possible occurrence of hash collisions. Moreover, this features
Ruji P. Medina+2 more
openaire +3 more sources
Proceedings of the 2014 conference on Innovation & technology in computer science education - ITiCSE '14, 2014
This poster presents a visualization tool SHAvisual for instructors to teach and students to learn the SHA-512 algorithm visually with demo and practice modes. This poster will also discuss some findings of classroom use and student reactions, which are very positive and encouraging.
Melissa S. Keranen+5 more
openaire +2 more sources
This poster presents a visualization tool SHAvisual for instructors to teach and students to learn the SHA-512 algorithm visually with demo and practice modes. This poster will also discuss some findings of classroom use and student reactions, which are very positive and encouraging.
Melissa S. Keranen+5 more
openaire +2 more sources
International Conference on Communication Systems and Network Technologies, 2022
To verify the integrity and confidentiality of data communicated through the web is a very big issue worldwide because every person wants very fast computing and secure electronic data communication via the web.
B. Ambedkar, P. Bharti, Akhtar Husain
semanticscholar +1 more source
To verify the integrity and confidentiality of data communicated through the web is a very big issue worldwide because every person wants very fast computing and secure electronic data communication via the web.
B. Ambedkar, P. Bharti, Akhtar Husain
semanticscholar +1 more source
2022 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS), 2022
The use of digital images is increasingly widespread currently. There is a need for security in digital photos. Cryptography is a technique that can be applied to secure data.
Rojali+2 more
semanticscholar +1 more source
The use of digital images is increasingly widespread currently. There is a need for security in digital photos. Cryptography is a technique that can be applied to secure data.
Rojali+2 more
semanticscholar +1 more source