Results 61 to 70 of about 147,726 (298)

A Large-Scale Secure Image Retrieval Method in Cloud Environment

open access: yesIEEE Access, 2019
With the rapid development of cloud computing technology, more and more users choose to outsource image data to clouds. To protect data's confidentiality, images need to be encrypted before being outsourced to clouds, but this brings difficulties to some
Yanyan Xu, Xiao Zhao, Jiaying Gong
doaj   +1 more source

Proofs of Security for the Unix Password Hashing Algorithm [PDF]

open access: yes, 2000
We give the first proof of security for the full Unix password hashing algorithm (rather than of a simplified variant). Our results show that it is very good at extracting almost all of the available strength from the underlying cryptographic primitive and provide good reason for confidence in the Unix construction.
David Wagner, Ian Goldberg
openaire   +2 more sources

Implementasi Sistem Otentikasi Dokumen Berbasis Quick Response (QR) Code dan Digital Signature

open access: yesJurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), 2021
The authenticity and integrity of documents are essential in data exchange and communication. Digital documents must be verifiable for their authenticity and integrity by all parties that use the documents.
Antika Lorien, Theophilus Wellem
doaj   +1 more source

A Contribution to Secure the Routing Protocol "Greedy Perimeter Stateless Routing" Using a Symmetric Signature-Based AES and MD5 Hash

open access: yes, 2011
This work presents a contribution to secure the routing protocol GPSR (Greedy Perimeter Stateless Routing) for vehicular ad hoc networks, we examine the possible attacks against GPSR and security solutions proposed by different research teams working on ...
Erritali, Mohammed   +2 more
core   +1 more source

When private set intersection meets big data : an efficient and scalable protocol [PDF]

open access: yes, 2013
Large scale data processing brings new challenges to the design of privacy-preserving protocols: how to meet the increasing requirements of speed and throughput of modern applications, and how to scale up smoothly when data being protected is big ...
Changyu Dong   +3 more
core   +3 more sources

LTCHA: LIGHT-WEIGHT TWO-WAY CRYPTOGRAPHIC HASH ALGORITHM FOR CLOUD [PDF]

open access: yesJournal of Engineering Science and Technology, 2018
The cryptographic hash algorithms play a significant role in preserving the data security in the wireless networks. The most frequently used hash algorithms such as Message Digest (MD5) and Secure Hash Algorithm (SHA1) need high computational overhead ...
V. VASANTHI, M. CHIDAMBARAM
doaj  

summarizing data for secure transaction a hash algorithm [PDF]

open access: yesAfrican Journal of Business Management, 2011
Hashing is a process of transforming a variable length data message into a fixed size message digest. Hashing algorithms are considered one-way functions, since the input cannot be determined from the message digests. As a security tool in data communication, hashing is used both for protecting data integrity and for authentication.
openaire   +2 more sources

A Symmetric and Multilayer Reconfigurable Architecture for Hash Algorithm

open access: yesElectronics, 2023
As an essential protection mechanism of information security, hash algorithms are extensively used in various security mechanisms. The diverse application scenarios make the implementation of hash algorithms more challenging regarding flexibility ...
Wang Fan   +5 more
semanticscholar   +1 more source

Block chain enabled hybrid cryptographic algorithm for security and privacy preservation of electronic health records

open access: yesICT Express
With recent trends, the cloud-computing paradigm has gained significant attention, especially in patient health monitoring applications. To date, several cryptographic methods have been introduced to accomplish secure medical data access and storage in ...
J. Ananda Babu   +5 more
doaj   +1 more source

SDOT: Secure Hash, Semantic Keyword Extraction, and Dynamic Operator Pattern-Based Three-Tier Forensic Classification Framework

open access: yesIEEE Access, 2023
Most traditional digital forensic techniques identify irrelevant files in a corpus using keyword search, frequent hashes, frequent paths, and frequent size methods.
D. Paul Joseph, P. Viswanathan
doaj   +1 more source

Home - About - Disclaimer - Privacy