Results 91 to 100 of about 32,597 (206)

Hardware-based Security for Virtual Trusted Platform Modules

open access: yes, 2013
Virtual Trusted Platform modules (TPMs) were proposed as a software-based alternative to the hardware-based TPMs to allow the use of their cryptographic functionalities in scenarios where multiple TPMs are required in a single platform, such as in ...
Alsouri, Sami   +3 more
core  

Implementation of a Data-Parallel Approach on a Lightweight Hash Function for IoT Devices

open access: yesMathematics
The Internet of Things is used in many application areas in our daily lives. Ensuring the security of valuable data transmitted over the Internet is a crucial challenge.
Abdullah Sevin
doaj   +1 more source

Security of a New Cryptographic Hash Function - Titanium [PDF]

open access: green, 2018
Abdullah Nazeeh Saleh   +1 more
openalex   +1 more source

Comprehensive Analysis of Cryptographic Algorithms: Implementation and Security Insights

open access: yesEngineering Proceedings
This study surveys some cryptographic algorithms in a detailed manner; it mainly focuses on symmetric key cryptography and asymmetric key cryptography with hash functions following them.
Rashid Muhenga   +4 more
doaj   +1 more source

Tightly-Secure Two-Tier Signatures on Code-Based Digital Signatures with Chameleon Hash Functions

open access: yesMathematics
In the current landscape where quantum algorithms pose a significant threat to conventional digital signature algorithms, code-based digital signature algorithms have emerged as the primary focus of ongoing research in post-quantum cryptography.
Yong Wang, Eddie Shahril Ismail
doaj   +1 more source

5G-MobiCare: A Secure 5G Assisted Remote Mobile Health Monitoring Platform

open access: yesIEEE Access
E-Healthcare utilizes IoT-enabled medical devices equipped with sensors to gather and transmit patient health data to a centralized electronic health record (EHR) system via mobile networks, enabling remote health management.
Hemangi Goswami   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy