Results 31 to 40 of about 142,210 (279)

Securing Financial Transactions with a Robust Algorithm: Preventing Double-Spending Attacks

open access: yesComputers, 2023
A zero-confirmation transaction is a transaction that has not yet been confirmed on the blockchain and is not yet part of the blockchain. The network propagates zero-confirmation transactions quickly, but they are not secured against double-spending ...
Hasan Hashim   +5 more
doaj   +1 more source

Quantum-secure message authentication via blind-unforgeability [PDF]

open access: yes, 2020
Formulating and designing unforgeable authentication of classical messages in the presence of quantum adversaries has been a challenge, as the familiar classical notions of unforgeability do not directly translate into meaningful notions in the quantum ...
CH Bennett   +17 more
core   +3 more sources

Hash Algorithm In Verification Of Certificate Data Integrity And Security

open access: yesAptisi Transactions on Technopreneurship (ATT), 2021
The hash function is the most important cryptographic primitive function and is an integral part of the blockchain data structure. Hashes are often used in cryptographic protocols, information security applications such as Digital Signatures and message authentication codes (MACs).
Muhammad Rehan Anwar   +2 more
openaire   +3 more sources

Analysis of the Possibility of Using Selected Hash Functions Submitted for the SHA-3 Competition in the SDEx Encryption Method [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2022
The paper presents analysis of the possibility of using selected hash functions submitted for the SHA-3 competition in the SDEx encryption method. The group of these functions will include the finalists of the SHA-3 competition, i.e.
Artur Hłobaż
doaj   +1 more source

REISCH: incorporating lightweight and reliable algorithms into healthcare applications of WSNs [PDF]

open access: yes, 2020
Healthcare institutions require advanced technology to collect patients' data accurately and continuously. The tradition technologies still suffer from two problems: performance and security efficiency.
Al-Zubaidie, Mishall   +2 more
core   +2 more sources

Performance analysis of energy efficient improved LEACH protocol in IoT networks

open access: yesIET Communications, EarlyView., 2022
Abstract The Internet of Things incorporates embedded technologies, wireless sensor networks, control and automation technologies, and wearable devices to enable integrated buildings, enterprises, intelligent homes, and wearable devices. Because sensor nodes have limited power, the energy consumption of the Internet of Things network is critical.
Surbhi Bhatia   +3 more
wiley   +1 more source

A secure data transmission and efficient data balancing approach for 5G‐based IoT data using UUDIS‐ECC and LSRHS‐CNN algorithms

open access: yesIET Communications, 2022
Due to the realization of 5G technology, the Internet of things (IoT) has made remarkable advancements in recent years. However, security along with data balancing issues is proffered owing to IoT data's growth.
Kusum Yadav   +6 more
doaj   +1 more source

Semi‐Paired Semi‐Supervised Deep Hashing for cross‐view retrieval

open access: yesIET Computer Vision, EarlyView., 2022
In this study, a Semi‐Paired Semi‐Supervised Deep Hashing (SPSDH) is proposed. SPSDH is a novel end‐to‐end deep neural network model with high‐order affinity. A non‐local higher‐order affinity measure that better considers the multimodal neighbourhood structure. And a common representation to associate different modalities is introduced, which combined
Yi Wang   +3 more
wiley   +1 more source

Keyed Hash Function Using Hyper Chaotic System With Time-Varying Parameters Perturbation

open access: yesIEEE Access, 2019
Secure hash function plays an important role in cryptography. This paper constructs a hash algorithm using the hyperchaotic Lorenz system, which serves as a sponge function to absorb input message via multiple parameters time-varying perturbation. First,
Hongjun Liu, Abdurahman Kadir, Jian Liu
doaj   +1 more source

Peer-to-Peer User Identity Verification Time Optimization in IoT Blockchain Network

open access: yesSensors, 2023
Blockchain introduces challenges related to the reliability of user identity and identity management systems; this includes detecting unfalsified identities linked to IoT applications.
Ammar Riadh Kairaldeen   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy