Zobrazeno 1 - 10
of 40 746
pro vyhledávání: '"Hash"'
Publikováno v:
Metalsmith. 2024, Vol. 44 Issue 2, p10-11. 2p. 2 Color Photographs.
Autor:
Benqiang Wei, Xianhui Lu
Publikováno v:
Cybersecurity, Vol 7, Iss 1, Pp 1-14 (2024)
Abstract Homomorphic evaluation of hash functions offers a solution to the challenge of data integrity authentication in the context of homomorphic encryption. The earliest attempt to achieve homomorphic evaluation of SHA-256 hash function was propos
Externí odkaz:
https://doaj.org/article/7a207e096fc74ea7a9bc8b0cc91ac68e
Publikováno v:
Automatika, Vol 65, Iss 3, Pp 1228-1240 (2024)
During the packaging process, it is essential to detect the steel stamping characters inside the box to identify any missing or repeated characters. Currently, manual detection suffers from low efficiency and a high false detection rate. To address t
Externí odkaz:
https://doaj.org/article/22b6748fba034ef7880b5a103adb6158
Publikováno v:
Shipin Kexue, Vol 45, Iss 10, Pp 1-8 (2024)
Food image retrieval, a major task in food computing, has garnered extensive attention in recent years. However, it faces two primary challenges. First, food images exhibit fine-grained characteristics, implying that visual differences between differ
Externí odkaz:
https://doaj.org/article/a71b0fbf635042e5abdf727c8ee6eef1
Publikováno v:
PeerJ Computer Science, Vol 10, p e2249 (2024)
The key derivation function is a specific cryptographic algorithm that transforms private string and public strings into one or more cryptographic keys. The cryptographic keys are essential for protecting electronic data during transmission on the in
Externí odkaz:
https://doaj.org/article/e36c60a0bcfe4f9dbd98346be08ebb21
Publikováno v:
网络与信息安全学报, Vol 10, Iss 2, Pp 81-94 (2024)
In the pursuit of establishing a unified model for fine-grained access control and secure data communication within a distributed microservices architecture, a verifier-policy attributed-based signature (VP-ABS) scheme, augmented with attribute revoc
Externí odkaz:
https://doaj.org/article/f297508c5b584c798a87c0391b953027
Publikováno v:
Journal of Big Data, Vol 11, Iss 1, Pp 1-18 (2024)
Abstract The exponential growth of data raises an unprecedented challenge in data analysis: how to retrieve interesting information from such large-scale data. Hash learning is a promising solution to address this challenge, because it may bring many
Externí odkaz:
https://doaj.org/article/a05b0ee7599a4354a6eb2aaf7574e2e2
Autor:
Alex Shafarenko
Publikováno v:
Cybersecurity, Vol 7, Iss 1, Pp 1-17 (2024)
Abstract This paper proposes and evaluates a new bipartite post-quantum digital signature protocol based on Winternitz chains and an oracle. Mutually mistrustful Alice and Bob are able to agree and sign a series of documents in a way that makes it im
Externí odkaz:
https://doaj.org/article/63573fecad3a4c25bff41110735cfaa3
Publikováno v:
Nuclear Engineering and Technology, Vol 56, Iss 4, Pp 1330-1338 (2024)
Information on isotopic composition and geometric structure is necessary for identifying a true warhead. Nevertheless, such classified information should be protected physically or electronically. With a novel Hash encryption algorithm, this paper pr
Externí odkaz:
https://doaj.org/article/cf4b4672ccd04a658557979327ba2de1
Autor:
Timucin Koroglu, Refik Samet
Publikováno v:
IEEE Access, Vol 12, Pp 18358-18386 (2024)
It is computationally impossible for one-way hash functions to obtain the original data again. In this study, Two Way Hash Function (TWHF) is proposed which provides the security properties of one-way hash functions. TWHF aims to hash/encrypt and dec
Externí odkaz:
https://doaj.org/article/0a3f9bf240bd42ab8808831720fa75c1