Results 51 to 60 of about 2,695,884 (227)

Integrity verification for digital Holy Quran verses using cryptographic hash function and compression

open access: yesJournal of King Saud University: Computer and Information Sciences, 2020
Data Integrity is one of the primary concepts in information security. The main task of the cryptographic hash function is to assure the integrity of the transmitted data.
Mishal Almazrooie   +5 more
doaj  

Analysis of the Cryptographic Hash function in block chains and its impact on the security of data transactions

open access: yes, 2018
A hash, as cryptographic functions are commonly known - can be defined as a mathematical algorithm capable of converting any data block into a new collection of characters with a specific size, regardless of the number of characters of the initial data ;
J. M. C. Lovelle, Y. Gutiérrez
semanticscholar   +1 more source

A secured cloud‐medical data sharing with A‐BRSA and Salp ‐Ant Lion Optimisation Algorithm

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Sharing medical data among healthcare providers, researchers, and patients is crucial for efficient healthcare services. Cloud‐assisted smart healthcare (s‐healthcare) systems have made it easier to store EHRs effectively. However, the traditional encryption algorithms used to secure this data can be vulnerable to attacks if the encryption key
Adel Binbusayyis   +7 more
wiley   +1 more source

A research on the impact of encryption algorithms on the quality of VPN tunnels’ transmission

open access: yesITM Web of Conferences, 2018
The following article presents the results on the impact of encryption algorithms and the cryptographic hash function on the QoS (Quality of Service) transmission in a computer network.
Strzęciwilk Dariusz   +3 more
doaj   +1 more source

Haraka v2 – Efficient Short-Input Hashing for Post-Quantum Applications

open access: yesIACR Transactions on Symmetric Cryptology, 2017
Recently, many efficient cryptographic hash function design strategies have been explored, not least because of the SHA-3 competition. These designs are, almost exclusively, geared towards high performance on long inputs.
Stefan Kölbl   +3 more
doaj   +1 more source

Enabling pandemic‐resilient healthcare: Narrowband Internet of Things and edge intelligence for real‐time monitoring

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract The Internet of Things (IoT) in deploying robotic sprayers for pandemic‐associated disinfection and monitoring has garnered significant attention in recent research. The authors introduce a novel architectural framework designed to interconnect smart monitoring robotic devices within healthcare facilities using narrowband Internet of Things ...
Md Motaharul Islam   +9 more
wiley   +1 more source

A Lightweight PUF-Based Authentication Protocol Using Secret Pattern Recognition for Constrained IoT Devices

open access: yesIEEE Access, 2021
PUFs, or physical unclonable functions, are hardware security primitives that can offer lightweight security solutions for constrained devices through challenge-response authentication protocols. However, the lightweight PUF-based security solutions that
Tarek A. Idriss   +2 more
doaj   +1 more source

Robust steganographic framework for securing sensitive healthcare data of telemedicine using convolutional neural network

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Data is the key element that runs the modern society. Large amounts of data are being released day by day as a result of many activities. The digital data is transferred through the Internet which may be vulnerable to attacks while transmitting. Especially, the medical data is observed to be of at most importance.
Rupa Ch   +4 more
wiley   +1 more source

High-Speed Variable Polynomial Toeplitz Hash Algorithm Based on FPGA

open access: yesEntropy, 2023
In the Quantum Key Distribution (QKD) network, authentication protocols play a critical role in safeguarding data interactions among users. To keep pace with the rapid advancement of QKD technology, authentication protocols must be capable of processing ...
Si-Cheng Huang   +4 more
doaj   +1 more source

Random Strip Peeling: A novel lightweight image encryption for IoT devices based on colour planes permutation

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract This paper introduces a novel lightweight colour image encryption algorithm, specifically designed for resource‐constrained environments such as Internet of Things (IoT) devices. As IoT systems become increasingly prevalent, secure and efficient data transmission becomes crucial.
Kenan İnce, Cemile İnce, Davut Hanbay
wiley   +1 more source

Home - About - Disclaimer - Privacy