Results 21 to 30 of about 147,685 (257)

Password Verification in Military Networks by using Secure Hash Algorithm

open access: goldIndian Journal of Science and Technology, 2016
Objectives: The main objective is to provide security for confidential information by exploiting external storage nodes applications for mobile nodes in military environments by using secure hash algorithm. Methods and analysis: In military environments we are having measure partitions like a parcel or a hostile region. There is no doubt at all they
Sai Ram Kiran Konduri   +3 more
openalex   +4 more sources

US Secure Hash Algorithm 1 (SHA1) [PDF]

open access: bronzeRequest for Comments, 2001
D. Eastlake, Paul B. Jones
openalex   +2 more sources

Instruction sequence expressions for the secure hash algorithm SHA-256

open access: green, 2013
The secure hash function SHA-256 is a function on bit strings. This means that its restriction to the bit strings of any given length can be computed by a finite instruction sequence that contains only instructions to set and get the content of Boolean registers, forward jump instructions, and a termination instruction.
J.A. Bergstra, C.A. Middelburg
openalex   +5 more sources

Integrity Authentication Based on Blockchain and Perceptual Hash for Remote-Sensing Imagery

open access: yesRemote Sensing, 2023
The integrity of remote-sensing image data is susceptible to corruption during storage and transmission. Perceptual hashing is a non-destructive data integrity-protection technique suitable for high-accuracy requirements of remote-sensing image data ...
Dingjie Xu, Na Ren, Changqing Zhu
doaj   +1 more source

A novel subset-based polynomial design for enhancing the security of short message-digest with inflated avalanche and random responses

open access: yesJournal of King Saud University: Computer and Information Sciences, 2023
The data breach and the integrity violation of remote data remain significant issues in the domain of information security. A provably-secure hash function aids in providing solutions to integrity-related issues.
P. Karthik   +5 more
doaj   +1 more source

Node authentication and encrypted data transmission in mobile ad hoc network using the swarm intelligence‐based secure ad‐hoc on‐demand distance vector algorithm

open access: yesIET Wireless Sensor Systems, 2023
In a mobile ad hoc network (MANET), all nodes are communicated with one another across wireless networks to create a temporary network without the support of centralised management. Due to dynamic topology in MANET, secure routing is a crucial issue. The
Anita R. Patil, Gautam M. Borkar
doaj   +1 more source

Blockchain and cloud computing-based secure electronic healthcare records storage and sharing

open access: yesFrontiers in Public Health, 2022
Healthcare information is essential for both service providers and patients. Further secure sharing and maintenance of Electronic Healthcare Records (EHR) are imperative.
Amna Amanat   +6 more
doaj   +1 more source

Implementation of a Secure Storage Using Blockchain for PCA-FRF Sensor Data of Plate-Like Structures

open access: yesIEEE Access, 2022
Structural Health Monitoring (SHM) systems have widely been used to guarantee the safe functioning of electrical, mechanical, civil, and aerospace engineering assets.
Meisam Gordan   +5 more
doaj   +1 more source

High Throughput Implementation of the Keccak Hash Function Using the Nios-II Processor

open access: yesTechnologies, 2020
Presently, cryptographic hash functions play a critical role in many applications, such as digital signature systems, security communications, protocols, and network security infrastructures.
Argyrios Sideris   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy