Results 251 to 260 of about 153,790 (328)
A secure data sharing scheme based on broadcast signcryption in data center. [PDF]
Dong R, Li Y, Zhu L.
europepmc +1 more source
High-Efficiency Traceability Mechanism for Multimedia Data in Consumer Internet of Things Combined with Blockchain. [PDF]
Yan T, Chen J, Zhang X, Hu G.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Secure Hash Algorithm based on Efficient Chaotic Neural Network
2016 International Conference on Communications (COMM), 2016Secure Hash Algorithm (SHA) is the most popularstandard of Hash functions. Several security protocols useSHA to provide message integrity, authentication and digitalsignature. Nowadays, a new technology based on Chaotic NeuralNetwork is used to design Hash functions due to the followingimportant properties of Neural Networks: non-linearity,compression,
Abdoun, Nabil +5 more
openaire +3 more sources
Implementation of Enhanced Secure Hash Algorithm Towards a Secured Web Portal
2019 IEEE 4th International Conference on Computer and Communication Systems (ICCCS), 2019In this paper, the application of the enhanced secure hash algorithm-512 is implemented on web applications specifically in password hashing. In addition to the enhancement of hash function, hill cipher is included for the salt generation to increase the complexity of generating hash tables that may be used as an attack on the algorithm. The testing of
Froilan E. De Guzman +2 more
openaire +2 more sources
IEEE India Conference, 2021
A secure hash code or message authentication code is a one-way hash algorithm. It is producing a fixed-size hash function to be used to check verification, the integrity of electronic data, password storage.
B. Ambedkar, P. Bharti, Akhtar Husain
semanticscholar +1 more source
A secure hash code or message authentication code is a one-way hash algorithm. It is producing a fixed-size hash function to be used to check verification, the integrity of electronic data, password storage.
B. Ambedkar, P. Bharti, Akhtar Husain
semanticscholar +1 more source
Comparative Analysis of Password Storage Security using Double Secure Hash Algorithm
2022 IEEE North Karnataka Subsection Flagship International Conference (NKCon), 2022Passwords are generally used to keep unauthorized users out of the system. Password hacking has become more common as the number of internet users has extended, causing a slew of issues.
Savarala Chethana +4 more
openaire +2 more sources

