Results 41 to 50 of about 13,790 (198)
Secure Medical Blockchain Model
The Internet of Medical Things (IoMT) uses wireless networks to help patients to communicate with healthcare professionals. Therefore, IoMT devices suffer from a lack of security controls, just like many Internet of Things (IoT) gadgets.
Ibrahim Shawky Farahat +4 more
doaj +1 more source
Terdapat berbagai macam cara untuk melaksanakan ujian di tingkat perguruan tinggi, selama masa pandemi Covid-19 metode ujian online menjadi banyak digunakan.
Ferzha Putra Utama +3 more
doaj +3 more sources
New Cryptanalysis of ZUC-256 Initialization Using Modular Differences
ZUC-256 is a stream cipher designed for 5G applications by the ZUC team. Together with AES-256 and SNOW-V, it is currently being under evaluation for standardized algorithms in 5G mobile telecommunications by Security Algorithms Group of Experts (SAGE).
Fukang Liu +5 more
doaj +1 more source
Analysis of the cryptographic strength of the SHA-256 hash function using the SAT approach
Cryptographic hash functions play a significant role in modern information security systems by ensuring data integrity and enabling efficient data compression. One of the most important and widely used cryptographic hash functions is SHA-256 that belongs
V. V. Davydov +3 more
doaj +1 more source
GABA+‐Edited Magnetic Resonance Spectroscopy Deep Learning Quality Assessment Framework
ABSTRACT Purpose Motivated by the need to improve GABA+‐edited magnetic resonance spectroscopy (MRS) quality, we developed a three‐module framework to improve transient averaging based on quality. We hypothesized that training a deep learning (DL) model to differentiate spectrum quality could improve transient averaging compared to traditional ...
Hanna Bugler +2 more
wiley +1 more source
Improving Data Integrity in Communication Systems by Designing a New Security Hash Algorithm [PDF]
The objective of this paper is to design a new secure hash algorithm with final hash code length 512 bits. The proposed hash code algorithm based on the combination of SHA-256 algorithm -with modification in its message expansion- and MD5algorithm based ...
Fouad, M., Hakim, S.
core +2 more sources
Miners' Reward Elasticity and Stability of Competing Proof‐of‐Work Cryptocurrencies
ABSTRACT Proof‐of‐Work cryptocurrencies employ miners to sustain the system through algorithmic reward adjustments. We develop a stochastic model of the multicurrency mining and identify conditions for stable transaction speeds. Bitcoin's algorithm requires hash supply elasticity <$<$1 for stability, while ASERT remains stable for any elasticity and ...
Kohei Kawaguchi +2 more
wiley +1 more source
A secure and efficient cryptographic hash function based on NewFORK-256
Cryptographic hash functions serve as a fundamental building block of information security and are used in numerous security applications and protocols such as digital signature schemes, construction of MAC and random number generation, for ensuring data
Harshvardhan Tiwari, Krishna Asawa
doaj +1 more source
Engineered surface strategies to manage dental implant‐related infections
Abstract When exposed to the oral environment, dental implants, like natural surfaces, become substrates for microbial adhesion and accumulation, often leading to implant‐related infections—one of the main causes of implant failure. These failures impose significant costs on patients, clinicians, and healthcare systems.
João Gabriel S. Souza +7 more
wiley +1 more source
The Art of Crypto Currencies: A Comprehensive Analysis of Popular Crypto Currencies
Crypto Currencies have recently gained enormous popularity amongst the general public. With each passing day, more and more companies are radically accepting crypto cur-rencies in their payment systems, paving way for an economic revolution.
Farooq, Sameet, Hameed, Sufian
core +1 more source

