Results 61 to 70 of about 3,272 (163)

C3Crowd$C^3Crowd$: Crowd Contributor and Consumer Framework for Secure Crowd Management Using Blockchain

open access: yesIET Blockchain, Volume 6, Issue 1, January/December 2026.
The study presents C3Crowd$C^3Crowd$, a blockchain‐based framework designed to enhance security in crowd management through decentralization, cryptography and smart contracts. It uses reputation management and a credit‐based incentive model to encourage user participation while safeguarding sensitive crowd data.
Sukanta Chakraborty, Abhishek Majumder
wiley   +1 more source

Evaluating the Energy Costs of SHA-256 and SHA-3 (KangarooTwelve) in Resource-Constrained IoT Devices

open access: yesIoT
The rapid expansion of Internet of Things (IoT) devices has heightened the demand for lightweight and secure cryptographic mechanisms suitable for resource-constrained environments.
Iain Baird   +4 more
doaj   +1 more source

Implementasi Algoritma SHA-256 Pada Aplikasi Duplicate Document Scanner

open access: yesResolusi : Rekayasa Teknik Informatika dan Informasi, 2022
On a computer, if we duplicate a file, the duplicated file is no different from the first file and this can be done in a fairly short time. In this case, what will be duplicated is a word document file with docx extension. SHA (Secure hash Algorithm) is a hash algorithm that is relatively new.
openaire   +1 more source

FPGA Realization of a Novel Hyperchaos Augmented Image Encryption Algorithm

open access: yesIET Computers &Digital Techniques, Volume 2026, Issue 1, 2026.
With the rapid growth of multimedia communication, protecting image data has become increasingly critical. This article proposes a novel 3‐stage hyperchaos‐based augmented image encryption technique (3SHAIET) that utilizes a three‐stage process with chaotic systems of increasing dimensionality (e.g., six‐dimensional [6D], 8D, and 9D) to enhance ...
Wassim Alexan   +6 more
wiley   +1 more source

SKE2SG: A Secure Key Establishment Scheme for Smart Grid Cyber‐Physical Systems Based on Elliptic Curve Cryptography

open access: yesIET Cyber-Physical Systems: Theory &Applications, Volume 11, Issue 1, January/December 2026.
Recent proposals by Mahmood et al., Braeken et al., and Chaudhry et al. aimed at establishing secure communication in AMI, asserting their methods fulfil the requisite security criteria. This paper, however, reveals that each of these proposals exhibits security vulnerabilities and lacks sufficient features for deployment.
Ahmad Rahdari, Bahareh Akhbari
wiley   +1 more source

Improved homomorphic evaluation for hash function based on TFHE

open access: yesCybersecurity
Homomorphic evaluation of hash functions offers a solution to the challenge of data integrity authentication in the context of homomorphic encryption. The earliest attempt to achieve homomorphic evaluation of SHA-256 hash function was proposed by Mella ...
Benqiang Wei, Xianhui Lu
doaj   +1 more source

A novel medical steganography technique based on Adversarial Neural Cryptography and digital signature using least significant bit replacement

open access: yesInternational Journal of Cognitive Computing in Engineering
With recent advances in technology protecting sensitive healthcare data is challenging. Particularly, one of the most serious issues with medical information security is protecting of medical content, such as the privacy of patients.
Mohamed Abdel Hameed   +3 more
doaj   +1 more source

A SHA-256 Hybrid-Redundancy Hardware Architecture for Detecting and Correcting Errors. [PDF]

open access: yesSensors (Basel), 2022
Algredo-Badillo I   +5 more
europepmc   +1 more source

Design of Smart and Secured Healthcare Service Using Deep Learning with Modified SHA-256 Algorithm. [PDF]

open access: yesHealthcare (Basel), 2022
Mohanty MD   +6 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy