Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
A proposed hash algorithm to use for blockchain base transaction flow system
Kamal, Zainab Ali, Ghani, Rana F.
Published in Periodicals of Engineering and Natural Sciences (PEN) (31.10.2021)
Published in Periodicals of Engineering and Natural Sciences (PEN) (31.10.2021)
Get full text
Journal Article
Research and Design of Theme Image Crawler Based on Difference Hash Algorithm
Wang, De-zhi, Liang, Jun-yan
Published in IOP conference series. Materials Science and Engineering (01.07.2019)
Published in IOP conference series. Materials Science and Engineering (01.07.2019)
Get full text
Journal Article
An Improved Secured Hash Algorithm(SHA1) Using Padding Index Method
De Guzman, Larry B, Salvador, Christian Ian P.
Published in 2024 1st International Conference on Cyber Security and Computing (CyberComp) (06.11.2024)
Published in 2024 1st International Conference on Cyber Security and Computing (CyberComp) (06.11.2024)
Get full text
Conference Proceeding
A new authentication procedure for client-server applications using HMAC
Shukla, Varun, Misra, Manoj Kumar, Chaturvedi, Atul
Published in Journal of discrete mathematical sciences & cryptography (04.07.2021)
Published in Journal of discrete mathematical sciences & cryptography (04.07.2021)
Get full text
Journal Article
IoT Implementation in Various Applications: A Detailed Review of Cyber Security Issues and Challenges
Lourens, Melanie, Gangodkar, Durgaprasad, Tiwari, Mohit, Buddhi, Dharam, Dharamvir, Dharamvir, Kuchhal, Shikha
Published in 2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE) (12.05.2023)
Published in 2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE) (12.05.2023)
Get full text
Conference Proceeding
Different Cryptographic Hash Functions for Security in the Blockchain
Sharma, Dhramandra, Saxena, Monika
Published in 2023 International Conference on Data Science and Network Security (ICDSNS) (28.07.2023)
Published in 2023 International Conference on Data Science and Network Security (ICDSNS) (28.07.2023)
Get full text
Conference Proceeding
ECDSA for Data Origin Authentication and Vehicle Security in VANET
Kushwah, Rashmi, Kulshreshtha, Ayushi, Singh, Krishnapal, Sharma, Shivanshu
Published in International Conference on Contemporary Computing (01.08.2019)
Published in International Conference on Contemporary Computing (01.08.2019)
Get full text
Conference Proceeding
Message Authentication in Vehicular Ad Hoc Networks: ECDSA Based Approach
Manvi, S.S., Kakkasageri, M.S., Adiga, D.G.
Published in Future Computer and Communications, Proceedings (01.04.2009)
Published in Future Computer and Communications, Proceedings (01.04.2009)
Get full text
Conference Proceeding
Mobil Kullanıcılar için Konum Tabanlı Rastlantısal Tek Kullanımlık Şifreler
ÖZSOY, Muhammed; Gazi Üniversitesi Bilişim Enstitüsü, Elektronik-Bilgisayar Eğitimi Anabilim Dalı Yüksek Lisans Öğrenci, BURUNKAYA, Mustafa; Gazi Üniversitesi Teknoloji Fakültesi, Elektrik Elektronik Mühendisliği Bölümü
Published in Bilişim Teknolojileri Dergisi; Vol 6, No 2 (2013): Bilişim Teknolojileri Dergisi; 21 (28.08.2013)
Get full text
Published in Bilişim Teknolojileri Dergisi; Vol 6, No 2 (2013): Bilişim Teknolojileri Dergisi; 21 (28.08.2013)
Journal Article
Instance Transfer Subject-Dependent Strategy for Motor Imagery Signal Classification Using Deep Convolutional Neural Networks
Duan, Nan, Han, ChengCheng, Tian, Peiyuan, Chen, Longting, Xu, Guanghua, Zhang, Kai, Zhang, Sicong
Published in Computational and mathematical methods in medicine (28.08.2020)
Published in Computational and mathematical methods in medicine (28.08.2020)
Get full text
Journal Article
A Defensive Strategy for Integrity Detection in Cyber-Physical Systems Subject to Deception Attacks
Ren, Xinwei, Liang, Jinling, Liu, Qingshan
Published in International Conference on Information Science and Technology (01.09.2020)
Published in International Conference on Information Science and Technology (01.09.2020)
Get full text
Conference Proceeding