Results 41 to 50 of about 142,210 (279)
Improving Data Integrity in Communication Systems by Designing a New Security Hash Algorithm [PDF]
The objective of this paper is to design a new secure hash algorithm with final hash code length 512 bits. The proposed hash code algorithm based on the combination of SHA-256 algorithm -with modification in its message expansion- and MD5algorithm based ...
Fouad, M., Hakim, S.
core +2 more sources
Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley +1 more source
An improved NFC device authentication protocol.
Aimed at the security authentication problem between Near Field Communication (NFC) devices, this paper uses the technology of asymmetric encryption algorithm, symmetric encryption algorithm, hash function, timestamp and survival period to improve the ...
He-Jun Lu, Dui Liu
doaj +1 more source
A Secure Multi-Party Computation Protocol for Graph Editing Distance against Malicious Attacks
The secure computation of the graph structure is an important element in the field of secure calculation of graphs, which is important in querying data in graphs, since there are no algorithms for the graph edit distance problem that can resist attacks ...
Xin Liu+6 more
doaj +1 more source
Trigonometric words ranking model for spam message classification
Abstract The significant increase in the volume of fake (spam) messages has led to an urgent need to develop and implement a robust anti‐spam method. Several of the current anti‐spam systems depend mainly on the word order of the message in determining the spam message, which results in the system's inability to predict the correct type of message when
Suha Mohammed Hadi+7 more
wiley +1 more source
SL2 homomorphic hash functions: Worst case to average case reduction and short collision search [PDF]
We study homomorphic hash functions into SL(2,q), the 2x2 matrices with determinant 1 over the field with $q$ elements. Modulo a well supported number theoretic hypothesis, which holds in particular for concrete homomorphisms proposed thus far, we ...
Mullan, Ciaran, Tsaban, Boaz
core +2 more sources
Hash-based signatures for the internet of things [PDF]
While numerous digital signature schemes exist in the literature, most real-world system rely on RSA-based signature schemes or on the digital signature algorithm (DSA), including its elliptic curve cryptography variant ECDSA.
Hülsing A.+4 more
core +1 more source
Enhancing the Security of MANETs using Hash Algorithms
AbstractHash functions are used in information security applications for the generation and verification of digital signatures, key derivation, and pseudorandom bit generation. Hash algorithms are secure because, for a given algorithm, it is computationally infeasible to find a message that corresponds to a given message digest, or to find two ...
Dilli Ravilla+1 more
openaire +2 more sources
Random Oracles in a Quantum World [PDF]
The interest in post-quantum cryptography - classical systems that remain secure in the presence of a quantum adversary - has generated elegant proposals for new cryptosystems.
C.H. Bennett+25 more
core +3 more sources
Galois Field-Based Image Encryption for Remote Transmission of Tumor Ultrasound Images
The remote transmission of tumor ultrasound images is an important link in telemedicine. Based on the Galois field (GF), this paper proposes an encryption algorithm that ensures the security of tumor ultrasound images (TUIs) during the transmission ...
Nan Wang+6 more
doaj +1 more source