Results 21 to 30 of about 147,685 (257)
Password Verification in Military Networks by using Secure Hash Algorithm
Objectives: The main objective is to provide security for confidential information by exploiting external storage nodes applications for mobile nodes in military environments by using secure hash algorithm. Methods and analysis: In military environments we are having measure partitions like a parcel or a hostile region. There is no doubt at all they
Sai Ram Kiran Konduri +3 more
openalex +4 more sources
US Secure Hash Algorithm 1 (SHA1) [PDF]
D. Eastlake, Paul B. Jones
openalex +2 more sources
Instruction sequence expressions for the secure hash algorithm SHA-256
The secure hash function SHA-256 is a function on bit strings. This means that its restriction to the bit strings of any given length can be computed by a finite instruction sequence that contains only instructions to set and get the content of Boolean registers, forward jump instructions, and a termination instruction.
J.A. Bergstra, C.A. Middelburg
openalex +5 more sources
Integrity Authentication Based on Blockchain and Perceptual Hash for Remote-Sensing Imagery
The integrity of remote-sensing image data is susceptible to corruption during storage and transmission. Perceptual hashing is a non-destructive data integrity-protection technique suitable for high-accuracy requirements of remote-sensing image data ...
Dingjie Xu, Na Ren, Changqing Zhu
doaj +1 more source
The data breach and the integrity violation of remote data remain significant issues in the domain of information security. A provably-secure hash function aids in providing solutions to integrity-related issues.
P. Karthik +5 more
doaj +1 more source
In a mobile ad hoc network (MANET), all nodes are communicated with one another across wireless networks to create a temporary network without the support of centralised management. Due to dynamic topology in MANET, secure routing is a crucial issue. The
Anita R. Patil, Gautam M. Borkar
doaj +1 more source
Blockchain and cloud computing-based secure electronic healthcare records storage and sharing
Healthcare information is essential for both service providers and patients. Further secure sharing and maintenance of Electronic Healthcare Records (EHR) are imperative.
Amna Amanat +6 more
doaj +1 more source
Implementation of a Secure Storage Using Blockchain for PCA-FRF Sensor Data of Plate-Like Structures
Structural Health Monitoring (SHM) systems have widely been used to guarantee the safe functioning of electrical, mechanical, civil, and aerospace engineering assets.
Meisam Gordan +5 more
doaj +1 more source
High Throughput Implementation of the Keccak Hash Function Using the Nios-II Processor
Presently, cryptographic hash functions play a critical role in many applications, such as digital signature systems, security communications, protocols, and network security infrastructures.
Argyrios Sideris +2 more
doaj +1 more source

