Results 21 to 30 of about 142,210 (279)

Password Verification in Military Networks by using Secure Hash Algorithm

open access: goldIndian Journal of Science and Technology, 2016
Objectives: The main objective is to provide security for confidential information by exploiting external storage nodes applications for mobile nodes in military environments by using secure hash algorithm. Methods and analysis: In military environments we are having measure partitions like a parcel or a hostile region. There is no doubt at all they
Sai Ram Kiran Konduri   +3 more
openalex   +4 more sources

Instruction sequence expressions for the secure hash algorithm SHA-256

open access: green, 2013
The secure hash function SHA-256 is a function on bit strings. This means that its restriction to the bit strings of any given length can be computed by a finite instruction sequence that contains only instructions to set and get the content of Boolean registers, forward jump instructions, and a termination instruction.
J.A. Bergstra, C.A. Middelburg
openalex   +5 more sources

Integrity Authentication Based on Blockchain and Perceptual Hash for Remote-Sensing Imagery

open access: yesRemote Sensing, 2023
The integrity of remote-sensing image data is susceptible to corruption during storage and transmission. Perceptual hashing is a non-destructive data integrity-protection technique suitable for high-accuracy requirements of remote-sensing image data ...
Dingjie Xu, Na Ren, Changqing Zhu
doaj   +1 more source

Node authentication and encrypted data transmission in mobile ad hoc network using the swarm intelligence‐based secure ad‐hoc on‐demand distance vector algorithm

open access: yesIET Wireless Sensor Systems, 2023
In a mobile ad hoc network (MANET), all nodes are communicated with one another across wireless networks to create a temporary network without the support of centralised management. Due to dynamic topology in MANET, secure routing is a crucial issue. The
Anita R. Patil, Gautam M. Borkar
doaj   +1 more source

Implementation of a Secure Storage Using Blockchain for PCA-FRF Sensor Data of Plate-Like Structures

open access: yesIEEE Access, 2022
Structural Health Monitoring (SHM) systems have widely been used to guarantee the safe functioning of electrical, mechanical, civil, and aerospace engineering assets.
Meisam Gordan   +5 more
doaj   +1 more source

Blockchain and cloud computing-based secure electronic healthcare records storage and sharing

open access: yesFrontiers in Public Health, 2022
Healthcare information is essential for both service providers and patients. Further secure sharing and maintenance of Electronic Healthcare Records (EHR) are imperative.
Amna Amanat   +6 more
doaj   +1 more source

High Throughput Implementation of the Keccak Hash Function Using the Nios-II Processor

open access: yesTechnologies, 2020
Presently, cryptographic hash functions play a critical role in many applications, such as digital signature systems, security communications, protocols, and network security infrastructures.
Argyrios Sideris   +2 more
doaj   +1 more source

User privacy prevention model using supervised federated learning‐based block chain approach for internet of Medical Things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan   +7 more
wiley   +1 more source

Secure Group based Routing and Flawless Trust Formulation in MANET using Unsupervised Machine Learning Approach for IoT Applications [PDF]

open access: yesEAI Endorsed Transactions on Energy Web, 2019
INTRODUCTION: Mobile Adhoc Network (MANET) is integrated with Internet of Things (IoT) in many application cases due to its flexibility and scalability. The dynamic nature of MANET introduces some security threats in IoT environment.
Maitreyi Ponguwala, DR.Sreenivasa Rao
doaj   +1 more source

Home - About - Disclaimer - Privacy