Loading…
JAVASCRIPT SECURITY USING CRYPTOGRAPHIC HASH FUNCTIONS
Rahimova, Irada, Qubadova, Firangiz, Asker zade, Barayat, Pohasii, Serhii
Published in Сучасні інформаційні системи (23.12.2019)
Published in Сучасні інформаційні системи (23.12.2019)
Get full text
Journal Article
Loading…
Loading…
Quantum algorithm to find invariant linear structure of MD hash functions
Wu, WanQing, Zhang, HuanGuo, Mao, ShaoWu, Wang, HouZhen
Published in Quantum information processing (01.03.2015)
Published in Quantum information processing (01.03.2015)
Get full text
Journal Article
Loading…
Long-Term Secure Time-Stamping Using Preimage-Aware Hash Functions
Published in Provable Security
(2017)
Get full text
Book Chapter
Loading…
Loading…
Zero-Shot Hashing via Asymmetric Ratio Similarity Matrix
Shi, Yang, Nie, Xiushan, Liu, Xingbo, Yang, Lu, Yin, Yilong
Published in IEEE transactions on knowledge and data engineering (01.05.2023)
Published in IEEE transactions on knowledge and data engineering (01.05.2023)
Get full text
Journal Article
Loading…
An Information-Theoretic Secure Group Authentication Scheme for Quantum Key Distribution Networks
Luo, Yi, Mao, Hao-Kun, Li, Qiong, Chen, Nan
Published in IEEE transactions on communications (01.09.2023)
Published in IEEE transactions on communications (01.09.2023)
Get full text
Journal Article
Loading…
Different Cryptographic Hash Functions for Security in the Blockchain
Sharma, Dhramandra, Saxena, Monika
Published in 2023 International Conference on Data Science and Network Security (ICDSNS) (28.07.2023)
Published in 2023 International Conference on Data Science and Network Security (ICDSNS) (28.07.2023)
Get full text
Conference Proceeding
Loading…
A Privacy-Preserving and Redactable Healthcare Blockchain System
Xu, Shengmin, Ning, Jianting, Li, Xiaoguo, Yuan, Jiaming, Huang, Xinyi, Deng, Robert H.
Published in IEEE transactions on services computing (01.03.2024)
Published in IEEE transactions on services computing (01.03.2024)
Get full text
Journal Article
Loading…
Loading…
New Applications of T-Functions in Block Ciphers and Hash Functions
Get full text
Book Chapter
Conference Proceeding
Loading…
An Efficient Access Control Method Based on One-way Hash Functions for Digital Videos
Imaizumi, Shoko, Abe, Yoshito, Fujiyoshi, Masaaki, Kiya, Hitoshi
Published in Eizō Jōhō Media Gakkaishi (01.11.2010)
Published in Eizō Jōhō Media Gakkaishi (01.11.2010)
Get full text
Journal Article
Loading…
Loading…
A Hash-Free method for FIB and LNPM in ICN programmable data planes
Rosa, Eduardo Castilho, Silva, Flavio de Oliveira
Published in 2022 International Conference on Information Networking (ICOIN) (12.01.2022)
Published in 2022 International Conference on Information Networking (ICOIN) (12.01.2022)
Get full text
Conference Proceeding
Loading…
Loading…
Enhanced Security In Medical Image Steganography -A Hybrid Approach Using Spatial And Transform Domain
B, Anumol V, Thejus, Pooja, Namboothiri, Leena Vishnu
Published in 2022 Second International Conference on Interdisciplinary Cyber Physical Systems (ICPS) (01.05.2022)
Published in 2022 Second International Conference on Interdisciplinary Cyber Physical Systems (ICPS) (01.05.2022)
Get full text
Conference Proceeding
Loading…
SIMBIoTA++: Improved Similarity-based IoT Malware Detection
Buttyan, Levente, Nagy, Roland, Papp, Dorottya
Published in 2022 IEEE 2nd Conference on Information Technology and Data Science (CITDS) (16.05.2022)
Published in 2022 IEEE 2nd Conference on Information Technology and Data Science (CITDS) (16.05.2022)
Get full text
Conference Proceeding