Results 31 to 40 of about 339,481 (270)
Peer-to-Peer User Identity Verification Time Optimization in IoT Blockchain Network
Blockchain introduces challenges related to the reliability of user identity and identity management systems; this includes detecting unfalsified identities linked to IoT applications.
Ammar Riadh Kairaldeen+3 more
doaj +1 more source
Keyed Hash Function Using Hyper Chaotic System With Time-Varying Parameters Perturbation
Secure hash function plays an important role in cryptography. This paper constructs a hash algorithm using the hyperchaotic Lorenz system, which serves as a sponge function to absorb input message via multiple parameters time-varying perturbation. First,
Hongjun Liu, Abdurahman Kadir, Jian Liu
doaj +1 more source
An improved NFC device authentication protocol.
Aimed at the security authentication problem between Near Field Communication (NFC) devices, this paper uses the technology of asymmetric encryption algorithm, symmetric encryption algorithm, hash function, timestamp and survival period to improve the ...
He-Jun Lu, Dui Liu
doaj +1 more source
A Secure Multi-Party Computation Protocol for Graph Editing Distance against Malicious Attacks
The secure computation of the graph structure is an important element in the field of secure calculation of graphs, which is important in querying data in graphs, since there are no algorithms for the graph edit distance problem that can resist attacks ...
Xin Liu+6 more
doaj +1 more source
Performance analysis of energy efficient improved LEACH protocol in IoT networks
Abstract The Internet of Things incorporates embedded technologies, wireless sensor networks, control and automation technologies, and wearable devices to enable integrated buildings, enterprises, intelligent homes, and wearable devices. Because sensor nodes have limited power, the energy consumption of the Internet of Things network is critical.
Surbhi Bhatia+3 more
wiley +1 more source
Semi‐Paired Semi‐Supervised Deep Hashing for cross‐view retrieval
In this study, a Semi‐Paired Semi‐Supervised Deep Hashing (SPSDH) is proposed. SPSDH is a novel end‐to‐end deep neural network model with high‐order affinity. A non‐local higher‐order affinity measure that better considers the multimodal neighbourhood structure. And a common representation to associate different modalities is introduced, which combined
Yi Wang+3 more
wiley +1 more source
Enhancing the Security of MANETs using Hash Algorithms
AbstractHash functions are used in information security applications for the generation and verification of digital signatures, key derivation, and pseudorandom bit generation. Hash algorithms are secure because, for a given algorithm, it is computationally infeasible to find a message that corresponds to a given message digest, or to find two ...
Dilli Ravilla+1 more
openaire +2 more sources
A Hybrid Domain Image Encryption Algorithm Based on Improved Henon Map
A hybrid domain image encryption algorithm is developed by integrating with improved Henon map, integer wavelet transform (IWT), bit-plane decomposition, and deoxyribonucleic acid (DNA) sequence operations. First, we improve the classical two-dimensional
Yong Chen, Shucui Xie, Jianzhong Zhang
doaj +1 more source
Galois Field-Based Image Encryption for Remote Transmission of Tumor Ultrasound Images
The remote transmission of tumor ultrasound images is an important link in telemedicine. Based on the Galois field (GF), this paper proposes an encryption algorithm that ensures the security of tumor ultrasound images (TUIs) during the transmission ...
Nan Wang+6 more
doaj +1 more source
The digital signature generation process begins with the creation of a public key and a private key. A public key is generated and published to verify the signature and calculate the hash value of the received document.
Asep Saepulrohman, Agus Ismangil
doaj +1 more source