Results 61 to 70 of about 142,210 (279)
Implementasi Sistem Otentikasi Dokumen Berbasis Quick Response (QR) Code dan Digital Signature
The authenticity and integrity of documents are essential in data exchange and communication. Digital documents must be verifiable for their authenticity and integrity by all parties that use the documents.
Antika Lorien, Theophilus Wellem
doaj +1 more source
Proofs of Security for the Unix Password Hashing Algorithm [PDF]
We give the first proof of security for the full Unix password hashing algorithm (rather than of a simplified variant). Our results show that it is very good at extracting almost all of the available strength from the underlying cryptographic primitive and provide good reason for confidence in the Unix construction.
David Wagner, Ian Goldberg
openaire +2 more sources
Chameleon: a Blind Double Trapdoor Hash Function for Securing AMI Data Aggregation [PDF]
Data aggregation is an integral part of Advanced Metering Infrastructure (AMI) deployment that is implemented by the concentrator. Data aggregation reduces the number of transmissions, thereby reducing communication costs and increasing the bandwidth ...
Keoh, Sye Loong+5 more
core +1 more source
A Multi-User, Single-Authentication Protocol for Smart Grid Architectures [PDF]
open access articleIn a smart grid system, the utility server collects data from various smart grid devices. These data play an important role in the energy distribution and balancing between the energy providers and energy consumers. However, these data
Al-Bayatti, Ali Hilal+2 more
core +2 more sources
A privacy-preserving fuzzy interest matching protocol for friends finding in social networks [PDF]
Nowadays, it is very popular to make friends, share photographs, and exchange news throughout social networks. Social networks widely expand the area of people’s social connections and make communication much smoother than ever before.
Ding, Yong+4 more
core +2 more sources
LTCHA: LIGHT-WEIGHT TWO-WAY CRYPTOGRAPHIC HASH ALGORITHM FOR CLOUD [PDF]
The cryptographic hash algorithms play a significant role in preserving the data security in the wireless networks. The most frequently used hash algorithms such as Message Digest (MD5) and Secure Hash Algorithm (SHA1) need high computational overhead ...
V. VASANTHI, M. CHIDAMBARAM
doaj
summarizing data for secure transaction a hash algorithm [PDF]
Hashing is a process of transforming a variable length data message into a fixed size message digest. Hashing algorithms are considered one-way functions, since the input cannot be determined from the message digests. As a security tool in data communication, hashing is used both for protecting data integrity and for authentication.
openaire +2 more sources
This work presents a contribution to secure the routing protocol GPSR (Greedy Perimeter Stateless Routing) for vehicular ad hoc networks, we examine the possible attacks against GPSR and security solutions proposed by different research teams working on ...
Erritali, Mohammed+2 more
core +1 more source
Most traditional digital forensic techniques identify irrelevant files in a corpus using keyword search, frequent hashes, frequent paths, and frequent size methods.
D. Paul Joseph, P. Viswanathan
doaj +1 more source
JAVASCRIPT SECURITY USING CRYPTOGRAPHIC HASH FUNCTIONS
The subject of this research is the development of methods of protection against attacks on third-party JavaScript and the document object model (DOM).
Irada Rahimova+3 more
doaj +1 more source