Results 51 to 60 of about 153,790 (328)
This work presents a contribution to secure the routing protocol GPSR (Greedy Perimeter Stateless Routing) for vehicular ad hoc networks, we examine the possible attacks against GPSR and security solutions proposed by different research teams working on ...
Erritali, Mohammed +2 more
core +1 more source
LTCHA: LIGHT-WEIGHT TWO-WAY CRYPTOGRAPHIC HASH ALGORITHM FOR CLOUD [PDF]
The cryptographic hash algorithms play a significant role in preserving the data security in the wireless networks. The most frequently used hash algorithms such as Message Digest (MD5) and Secure Hash Algorithm (SHA1) need high computational overhead ...
V. VASANTHI, M. CHIDAMBARAM
doaj
Implementasi Sistem Otentikasi Dokumen Berbasis Quick Response (QR) Code dan Digital Signature
The authenticity and integrity of documents are essential in data exchange and communication. Digital documents must be verifiable for their authenticity and integrity by all parties that use the documents.
Antika Lorien, Theophilus Wellem
doaj +1 more source
A secured Cryptographic Hashing Algorithm
Cryptographic hash functions for calculating the message digest of a message has been in practical use as an effective measure to maintain message integrity since a few decades. This message digest is unique, irreversible and avoids all types of collisions for any given input string.
Mohanty, Rakesh +2 more
openaire +2 more sources
With recent trends, the cloud-computing paradigm has gained significant attention, especially in patient health monitoring applications. To date, several cryptographic methods have been introduced to accomplish secure medical data access and storage in ...
J. Ananda Babu +5 more
doaj +1 more source
Secure and Fast Hashing Algorithm with Multiple Security Levels
We propose a new secure and fast hashing algorithm with multiple security levels (SFHA-MSL). It is based on the generic 3C (3 compressions) construction and the 3C-X (3C XOR) hash function which is the simplest and efficient variant of the generic 3C hash function and it is the simplest modification to the Merkle-Damgard (M-D) iterated construction ...
Hassan M. Elkamchouchi +2 more
openaire +1 more source
Chosen-ciphertext security from subset sum [PDF]
We construct a public-key encryption (PKE) scheme whose security is polynomial-time equivalent to the hardness of the Subset Sum problem. Our scheme achieves the standard notion of indistinguishability against chosen-ciphertext attacks (IND-CCA) and can
A Shallue +26 more
core +2 more sources
The researcher has recently been working on the authenticity of information particularly with the use of cryptographic hash functions such as MD5 and Secure Hash Algorithm (SHA).
Francis G. Balazon
doaj +1 more source
Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices [PDF]
Networks are evolving toward a ubiquitous model in which heterogeneous devices are interconnected. Cryptographic algorithms are required for developing security solutions that protect network activity. However, the computational and energy limitations
Herrera JoancomartĂ, Jordi +1 more
core +4 more sources
Most traditional digital forensic techniques identify irrelevant files in a corpus using keyword search, frequent hashes, frequent paths, and frequent size methods.
D. Paul Joseph, P. Viswanathan
doaj +1 more source

