Results 91 to 100 of about 32,597 (206)
A Novel Approach to Increase Security in AODV Using RSA Asymmetric Cryptography and Hash Function [PDF]
Utkarsh Mendevell
openalex +1 more source
Hardware-based Security for Virtual Trusted Platform Modules
Virtual Trusted Platform modules (TPMs) were proposed as a software-based alternative to the hardware-based TPMs to allow the use of their cryptographic functionalities in scenarios where multiple TPMs are required in a single platform, such as in ...
Alsouri, Sami +3 more
core
Basic Cryptographic Concepts and Open Problems in Hash Function Security
Johnna Smith, Donald Mills
openalex +2 more sources
Implementation of a Data-Parallel Approach on a Lightweight Hash Function for IoT Devices
The Internet of Things is used in many application areas in our daily lives. Ensuring the security of valuable data transmitted over the Internet is a crucial challenge.
Abdullah Sevin
doaj +1 more source
Security Properties of Domain Extenders for Cryptographic Hash Functions [PDF]
Elena Andreeva +2 more
openalex +1 more source
Security of a New Cryptographic Hash Function - Titanium [PDF]
Abdullah Nazeeh Saleh +1 more
openalex +1 more source
Comprehensive Analysis of Cryptographic Algorithms: Implementation and Security Insights
This study surveys some cryptographic algorithms in a detailed manner; it mainly focuses on symmetric key cryptography and asymmetric key cryptography with hash functions following them.
Rashid Muhenga +4 more
doaj +1 more source
Tightly-Secure Two-Tier Signatures on Code-Based Digital Signatures with Chameleon Hash Functions
In the current landscape where quantum algorithms pose a significant threat to conventional digital signature algorithms, code-based digital signature algorithms have emerged as the primary focus of ongoing research in post-quantum cryptography.
Yong Wang, Eddie Shahril Ismail
doaj +1 more source
5G-MobiCare: A Secure 5G Assisted Remote Mobile Health Monitoring Platform
E-Healthcare utilizes IoT-enabled medical devices equipped with sensors to gather and transmit patient health data to a centralized electronic health record (EHR) system via mobile networks, enabling remote health management.
Hemangi Goswami +2 more
doaj +1 more source

