Results 61 to 70 of about 142,210 (279)

Implementasi Sistem Otentikasi Dokumen Berbasis Quick Response (QR) Code dan Digital Signature

open access: yesJurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), 2021
The authenticity and integrity of documents are essential in data exchange and communication. Digital documents must be verifiable for their authenticity and integrity by all parties that use the documents.
Antika Lorien, Theophilus Wellem
doaj   +1 more source

Proofs of Security for the Unix Password Hashing Algorithm [PDF]

open access: yes, 2000
We give the first proof of security for the full Unix password hashing algorithm (rather than of a simplified variant). Our results show that it is very good at extracting almost all of the available strength from the underlying cryptographic primitive and provide good reason for confidence in the Unix construction.
David Wagner, Ian Goldberg
openaire   +2 more sources

Chameleon: a Blind Double Trapdoor Hash Function for Securing AMI Data Aggregation [PDF]

open access: yes, 2018
Data aggregation is an integral part of Advanced Metering Infrastructure (AMI) deployment that is implemented by the concentrator. Data aggregation reduces the number of transmissions, thereby reducing communication costs and increasing the bandwidth ...
Keoh, Sye Loong   +5 more
core   +1 more source

A Multi-User, Single-Authentication Protocol for Smart Grid Architectures [PDF]

open access: yes, 2020
open access articleIn a smart grid system, the utility server collects data from various smart grid devices. These data play an important role in the energy distribution and balancing between the energy providers and energy consumers. However, these data
Al-Bayatti, Ali Hilal   +2 more
core   +2 more sources

A privacy-preserving fuzzy interest matching protocol for friends finding in social networks [PDF]

open access: yes, 2017
Nowadays, it is very popular to make friends, share photographs, and exchange news throughout social networks. Social networks widely expand the area of people’s social connections and make communication much smoother than ever before.
Ding, Yong   +4 more
core   +2 more sources

LTCHA: LIGHT-WEIGHT TWO-WAY CRYPTOGRAPHIC HASH ALGORITHM FOR CLOUD [PDF]

open access: yesJournal of Engineering Science and Technology, 2018
The cryptographic hash algorithms play a significant role in preserving the data security in the wireless networks. The most frequently used hash algorithms such as Message Digest (MD5) and Secure Hash Algorithm (SHA1) need high computational overhead ...
V. VASANTHI, M. CHIDAMBARAM
doaj  

summarizing data for secure transaction a hash algorithm [PDF]

open access: yesAfrican Journal of Business Management, 2011
Hashing is a process of transforming a variable length data message into a fixed size message digest. Hashing algorithms are considered one-way functions, since the input cannot be determined from the message digests. As a security tool in data communication, hashing is used both for protecting data integrity and for authentication.
openaire   +2 more sources

A Contribution to Secure the Routing Protocol "Greedy Perimeter Stateless Routing" Using a Symmetric Signature-Based AES and MD5 Hash

open access: yes, 2011
This work presents a contribution to secure the routing protocol GPSR (Greedy Perimeter Stateless Routing) for vehicular ad hoc networks, we examine the possible attacks against GPSR and security solutions proposed by different research teams working on ...
Erritali, Mohammed   +2 more
core   +1 more source

SDOT: Secure Hash, Semantic Keyword Extraction, and Dynamic Operator Pattern-Based Three-Tier Forensic Classification Framework

open access: yesIEEE Access, 2023
Most traditional digital forensic techniques identify irrelevant files in a corpus using keyword search, frequent hashes, frequent paths, and frequent size methods.
D. Paul Joseph, P. Viswanathan
doaj   +1 more source

JAVASCRIPT SECURITY USING CRYPTOGRAPHIC HASH FUNCTIONS

open access: yesСучасні інформаційні системи, 2019
The subject of this research is the development of methods of protection against attacks on third-party JavaScript and the document object model (DOM).
Irada Rahimova   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy