Results 61 to 70 of about 3,272 (163)
The study presents C3Crowd$C^3Crowd$, a blockchain‐based framework designed to enhance security in crowd management through decentralization, cryptography and smart contracts. It uses reputation management and a credit‐based incentive model to encourage user participation while safeguarding sensitive crowd data.
Sukanta Chakraborty, Abhishek Majumder
wiley +1 more source
The rapid expansion of Internet of Things (IoT) devices has heightened the demand for lightweight and secure cryptographic mechanisms suitable for resource-constrained environments.
Iain Baird +4 more
doaj +1 more source
Implementasi Algoritma SHA-256 Pada Aplikasi Duplicate Document Scanner
On a computer, if we duplicate a file, the duplicated file is no different from the first file and this can be done in a fairly short time. In this case, what will be duplicated is a word document file with docx extension. SHA (Secure hash Algorithm) is a hash algorithm that is relatively new.
openaire +1 more source
FPGA Realization of a Novel Hyperchaos Augmented Image Encryption Algorithm
With the rapid growth of multimedia communication, protecting image data has become increasingly critical. This article proposes a novel 3‐stage hyperchaos‐based augmented image encryption technique (3SHAIET) that utilizes a three‐stage process with chaotic systems of increasing dimensionality (e.g., six‐dimensional [6D], 8D, and 9D) to enhance ...
Wassim Alexan +6 more
wiley +1 more source
Recent proposals by Mahmood et al., Braeken et al., and Chaudhry et al. aimed at establishing secure communication in AMI, asserting their methods fulfil the requisite security criteria. This paper, however, reveals that each of these proposals exhibits security vulnerabilities and lacks sufficient features for deployment.
Ahmad Rahdari, Bahareh Akhbari
wiley +1 more source
Improved homomorphic evaluation for hash function based on TFHE
Homomorphic evaluation of hash functions offers a solution to the challenge of data integrity authentication in the context of homomorphic encryption. The earliest attempt to achieve homomorphic evaluation of SHA-256 hash function was proposed by Mella ...
Benqiang Wei, Xianhui Lu
doaj +1 more source
With recent advances in technology protecting sensitive healthcare data is challenging. Particularly, one of the most serious issues with medical information security is protecting of medical content, such as the privacy of patients.
Mohamed Abdel Hameed +3 more
doaj +1 more source
A Multiple-Medical-Image Encryption Method Based on SHA-256 and DNA Encoding. [PDF]
Wu J, Zhang J, Liu D, Wang X.
europepmc +1 more source
A SHA-256 Hybrid-Redundancy Hardware Architecture for Detecting and Correcting Errors. [PDF]
Algredo-Badillo I +5 more
europepmc +1 more source
Design of Smart and Secured Healthcare Service Using Deep Learning with Modified SHA-256 Algorithm. [PDF]
Mohanty MD +6 more
europepmc +1 more source

