Results 261 to 270 of about 147,726 (298)
Some of the next articles are maybe not open access.
Design and Implementation of Reconfigurable Security Hash Algorithms Based on FPGA
2009 WASE International Conference on Information Engineering, 2009Today, security is a topic which attacks the greatinterest of researchers. Many encryption algorithms have beeninvestigated, and developed in the last years. Hash functionsare important security primitives used for authentication anddata integrity. The reconfigurable cryptographic chip is anintegrated circuit that is designed by means of the method ...
Xiaohui Yang +3 more
openaire +2 more sources
Hashing algorithms – a way to secure your application
2008This article presents one of the mechanisms of ensuring security in applications designed in Java programming language – hashing algorithms. It describes selected elements of Java Cryptographic Architecture library. Chosen algorithms were scrutinized in terms of the security and how fast they work.
Ireneusz J. Jóźwiak +2 more
openaire +2 more sources
An efficient parallel algorithm for hash computation in security and forensics applications
2014 IEEE International Advance Computing Conference (IACC), 2014Hashing algorithms are used extensively in information security and digital forensics applications. This paper presents an efficient parallel algorithm hash computation. It's a modification of the SHA-1 algorithm for faster parallel implementation in applications such as the digital signature and data preservation in digital forensics.
Neha Kishore, Bhanu Kapoor
openaire +2 more sources
Deploying New Hash Algorithms in Secure Neighbor Discovery
2011IP protocol version 6 (IPv6), a successor of IP protocol version 4 (IPv4), puts a significant effort in enhancing security facilities. Secure Neighbor Discovery (SEND) is an optional IPv6 protocol that counters threats in link-local communication allowed by Neighbor Discovery protocol (NDP).
Mikuc, Miljenko +2 more
openaire +1 more source
Clinical management of metastatic colorectal cancer in the era of precision medicine
Ca-A Cancer Journal for Clinicians, 2022Davide Ciardiello +2 more
exaly
A novel chaos-based image encryption using DNA sequence operation and Secure Hash Algorithm SHA-2
Nonlinear dynamics, 2015Ramzi Guesmi +3 more
semanticscholar +1 more source
Signature based Merkle Hash Multiplication algorithm to secure the communication in IoT devices
Knowledge-Based Systems, 2022S. Kumari +3 more
semanticscholar +1 more source
Generalized Secure Hash Algorithm: SHA-X
International Journal of Advancements in Computing Technology, 2012Yi-Shiung Yeh +3 more
openaire +2 more sources
International Conference on Control, Engineering & Information Technology, 2016
N. B. Slimane +2 more
semanticscholar +1 more source
N. B. Slimane +2 more
semanticscholar +1 more source

