Results 31 to 40 of about 339,481 (270)

Peer-to-Peer User Identity Verification Time Optimization in IoT Blockchain Network

open access: yesSensors, 2023
Blockchain introduces challenges related to the reliability of user identity and identity management systems; this includes detecting unfalsified identities linked to IoT applications.
Ammar Riadh Kairaldeen   +3 more
doaj   +1 more source

Keyed Hash Function Using Hyper Chaotic System With Time-Varying Parameters Perturbation

open access: yesIEEE Access, 2019
Secure hash function plays an important role in cryptography. This paper constructs a hash algorithm using the hyperchaotic Lorenz system, which serves as a sponge function to absorb input message via multiple parameters time-varying perturbation. First,
Hongjun Liu, Abdurahman Kadir, Jian Liu
doaj   +1 more source

An improved NFC device authentication protocol.

open access: yesPLoS ONE, 2021
Aimed at the security authentication problem between Near Field Communication (NFC) devices, this paper uses the technology of asymmetric encryption algorithm, symmetric encryption algorithm, hash function, timestamp and survival period to improve the ...
He-Jun Lu, Dui Liu
doaj   +1 more source

A Secure Multi-Party Computation Protocol for Graph Editing Distance against Malicious Attacks

open access: yesMathematics, 2023
The secure computation of the graph structure is an important element in the field of secure calculation of graphs, which is important in querying data in graphs, since there are no algorithms for the graph edit distance problem that can resist attacks ...
Xin Liu   +6 more
doaj   +1 more source

Performance analysis of energy efficient improved LEACH protocol in IoT networks

open access: yesIET Communications, EarlyView., 2022
Abstract The Internet of Things incorporates embedded technologies, wireless sensor networks, control and automation technologies, and wearable devices to enable integrated buildings, enterprises, intelligent homes, and wearable devices. Because sensor nodes have limited power, the energy consumption of the Internet of Things network is critical.
Surbhi Bhatia   +3 more
wiley   +1 more source

Semi‐Paired Semi‐Supervised Deep Hashing for cross‐view retrieval

open access: yesIET Computer Vision, EarlyView., 2022
In this study, a Semi‐Paired Semi‐Supervised Deep Hashing (SPSDH) is proposed. SPSDH is a novel end‐to‐end deep neural network model with high‐order affinity. A non‐local higher‐order affinity measure that better considers the multimodal neighbourhood structure. And a common representation to associate different modalities is introduced, which combined
Yi Wang   +3 more
wiley   +1 more source

Enhancing the Security of MANETs using Hash Algorithms

open access: yesProcedia Computer Science, 2015
AbstractHash functions are used in information security applications for the generation and verification of digital signatures, key derivation, and pseudorandom bit generation. Hash algorithms are secure because, for a given algorithm, it is computationally infeasible to find a message that corresponds to a given message digest, or to find two ...
Dilli Ravilla   +1 more
openaire   +2 more sources

A Hybrid Domain Image Encryption Algorithm Based on Improved Henon Map

open access: yesEntropy, 2022
A hybrid domain image encryption algorithm is developed by integrating with improved Henon map, integer wavelet transform (IWT), bit-plane decomposition, and deoxyribonucleic acid (DNA) sequence operations. First, we improve the classical two-dimensional
Yong Chen, Shucui Xie, Jianzhong Zhang
doaj   +1 more source

Galois Field-Based Image Encryption for Remote Transmission of Tumor Ultrasound Images

open access: yesIEEE Access, 2019
The remote transmission of tumor ultrasound images is an important link in telemedicine. Based on the Galois field (GF), this paper proposes an encryption algorithm that ensures the security of tumor ultrasound images (TUIs) during the transmission ...
Nan Wang   +6 more
doaj   +1 more source

Data integrity and security of digital signatures on electronic systems using the digital signature algorithm (DSA)

open access: yesInternational Journal of Electronics and Communications System, 2021
The digital signature generation process begins with the creation of a public key and a private key. A public key is generated and published to verify the signature and calculate the hash value of the received document.
Asep Saepulrohman, Agus Ismangil
doaj   +1 more source

Home - About - Disclaimer - Privacy