Výsledky vyhledávání - "Hash based algorithms"
-
1
IMPROVE DATA ENCRYPTION BY USING DIFFIE-HELLMAN AND DNA ALGORITHMS, AUTHENTICATED BY HMAC-HASH256
ISSN: 0976-5697, 0976-5697Vydáno: Udaipur International Journal of Advanced Research in Computer Science 20.08.2025Vydáno v International journal of advanced research in computer science (20.08.2025)“…: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications…”
Získat plný text
Journal Article -
2
The Impact of Quantum Computing on Present Cryptography
ISSN: 2158-107X, 2156-5570“… In particular the reader can delve into the following subjects: present cryptographic schemes…”Vydáno: West Yorkshire Science and Information (SAI) Organization Limited 2018
Získat plný text
Journal Article -
3
AAU-Net: Attention-Based Asymmetric U-Net for Subject-Sensitive Hashing of Remote Sensing Images
ISSN: 2072-4292, 2072-4292Vydáno: Basel MDPI AG 01.12.2021Vydáno v Remote sensing (Basel, Switzerland) (01.12.2021)“… As a special subset of perceptual hashing, subject-sensitive hashing overcomes the shortcomings of the existing perceptual hashing that cannot distinguish…”
Získat plný text
Journal Article -
4
Analysis of Histopathological Images for Early Diagnosis of Oral Squamous Cell Carcinoma by Hybrid Systems Based on CNN Fusion Features
ISSN: 0884-8173, 1098-111XVydáno: New York Hindawi 2023Vydáno v International journal of intelligent systems (2023)“… Manual diagnosis is still subject to errors and differences in doctors’ opinions, especially in the early stages…”
Získat plný text
Journal Article -
5
A New Subject-Sensitive Hashing Algorithm Based on Multi-PatchDrop and Swin-Unet for the Integrity Authentication of HRRS Image
ISSN: 2220-9964, 2220-9964Vydáno: Basel MDPI AG 01.09.2024Vydáno v ISPRS international journal of geo-information (01.09.2024)“…Transformer-based subject-sensitive hashing algorithms exhibit good integrity authentication performance and have the potential to ensure the authenticity and convenience of high-resolution remote sensing (HRRS) images…”
Získat plný text
Journal Article -
6
Secret-Key Exchange Through Synchronization of Randomized Chaotic Oscillators Aided by Logistic Hash Function
ISSN: 1549-8328, 1558-0806Vydáno: New York IEEE 01.04.2022Vydáno v IEEE transactions on circuits and systems. I, Regular papers (01.04.2022)“… Two legitimate users are assumed to possess chaotic oscillators subject to the original Lorenz equations to exchange randomized chaotic signals…”
Získat plný text
Journal Article -
7
Randomization of message contents with and without encryption for covert communication scenarios: Randomization of Message Contents With and Without Encryption for Covert Communication Scenarios
ISSN: 1615-5262, 1615-5270Vydáno: Berlin/Heidelberg Springer Berlin Heidelberg 01.02.2026Vydáno v International journal of information security (01.02.2026)“…Steganographic methods often presuppose that the concealed message appears random upon encoding. When confidentiality is a concern, encryption results in a…”
Získat plný text
Journal Article -
8
A New Subject-Sensitive Hashing Algorithm Based on MultiRes-RCF for Blockchains of HRRS Images
ISSN: 1999-4893, 1999-4893Vydáno: Basel MDPI AG 01.06.2022Vydáno v Algorithms (01.06.2022)“…) images, we propose a new subject-sensitive hashing algorithm specially for HRRS image blockchains…”
Získat plný text
Journal Article -
9
Data-Dependent Hashing Based on p-Stable Distribution
ISSN: 1057-7149, 1941-0042, 1941-0042Vydáno: United States IEEE 01.12.2014Vydáno v IEEE transactions on image processing (01.12.2014)“… Each projection vector is a linear combination of multiple random vectors subject to p-stable distribution, in which the weights for the linear combination are learned based on the training data…”
Získat plný text
Journal Article -
10
A secure data transmission and efficient data balancing approach for 5G‐based IoT data using UUDIS‐ECC and LSRHS‐CNN algorithms
ISSN: 1751-8628, 1751-8636Vydáno: Stevenage John Wiley & Sons, Inc 01.03.2022Vydáno v IET communications (01.03.2022)“…Due to the realization of 5G technology, the Internet of things (IoT) has made remarkable advancements in recent years. However, security along with data…”
Získat plný text
Journal Article -
11
SLOW HASHING SPEED AS A PROTECTION FOR WEAK PASSWORDS
ISSN: 2304-7712, 2304-7720Vydáno: Chung-Li Educational Research Multimedia & Publications 01.06.2020Vydáno v International Journal of Advanced Engineering and Science (01.06.2020)“… However, the majority of individuals likely use weak passwords for convenience. If a database is breached and a password hash is subject to a dictionary-based…”
Získat plný text
Journal Article -
12
Semi-U-Net: A Lightweight Deep Neural Network for Subject-Sensitive Hashing of HRRS Images
ISSN: 2169-3536, 2169-3536Vydáno: Piscataway IEEE 2021Vydáno v IEEE access (2021)“…As a special case of perceptual hashing algorithm, subject-sensitive hashing can realize "subject-biased" integrity authentication of high resolution remote sensing (HRRS…”
Získat plný text
Journal Article -
13
Use of locality sensitive hashing (LSH) algorithm to match Web of Science and Scopus
ISSN: 0138-9130, 1588-2861Vydáno: Cham Springer International Publishing 01.08.2018Vydáno v Scientometrics (01.08.2018)“…A novel hashing algorithm is applied to match two prominent and important bibliographic databases at the paper level. In the literature, such tasks have been…”
Získat plný text
Journal Article -
14
A flexible image encryption algorithm based on 3D CTBCS and DNA computing
ISSN: 1380-7501, 1573-7721Vydáno: New York Springer US 01.07.2021Vydáno v Multimedia tools and applications (01.07.2021)“…In this paper, a novel image encryption algorithm based on a new discrete chaotic system is presented. The chaotic characteristics of the new chaotic system…”
Získat plný text
Journal Article -
15
Exploration and Practice of the Acquisition Path of Spoken English for Special Purposes with the Blockchain Technology
ISSN: 1574-017X, 1875-905XVydáno: Amsterdam Hindawi 16.08.2022Vydáno v Mobile information systems (16.08.2022)“…With the increasing trend of globalization, English, as the most widely used language in the world, has become a subject that many people must learn…”
Získat plný text
Journal Article -
16
Web Applications Login Authentication Scheme Using Hybrid Cryptography with User Anonymity
ISSN: 2074-9023, 2074-9031Vydáno: Hong Kong Modern Education and Computer Science Press 01.10.2022Vydáno v International journal of information engineering and electronic business (01.10.2022)“… Present schemes have limitations such as users spent a lot of time browsing to create image portfolios than to create passwords and PINs, subject to active impersonation attack, some will only suit…”
Získat plný text
Journal Article -
17
Reliable Security Algorithm for Drones Using Individual Characteristics From an EEG Signal
ISSN: 2169-3536, 2169-3536Vydáno: Piscataway IEEE 01.01.2018Vydáno v IEEE access (01.01.2018)“…; scientific research involving UAVs has encompassed a wide range of scientific study. However, communication with unmanned vehicles are subject to attack and compromise…”
Získat plný text
Journal Article -
18
Research on Multimedia Technology-Assisted College English Grammar Teaching
ISSN: 1530-8669, 1530-8677Vydáno: Oxford Hindawi 2022Vydáno v Wireless communications and mobile computing (2022)“…The English Curriculum Standard for Compulsory Education lists the specific requirements for the integration of English discipline and information technology…”
Získat plný text
Journal Article -
19
Secure Authentication Framework for SDN-IoT network using Keccak-256 and Bliss-B algorithms
ISSN: 2511-2104, 2511-2112Vydáno: Singapore Springer Nature Singapore 01.01.2023Vydáno v International journal of information technology (Singapore. Online) (01.01.2023)“… The SDN, on the other hand, is particularly subject to attacks since it relies on a centralised controller for network management, which attackers can simply alter…”
Získat plný text
Journal Article -
20
A 3D Image Encryption Algorithm Based on the Chaotic System and the Image Segmentation
ISSN: 2169-3536, 2169-3536Vydáno: Piscataway IEEE 01.01.2020Vydáno v IEEE access (01.01.2020)“… The security analysis shows that the proposed 3D image file encryption algorithm possesses higher security features to preserve the subject and resist conventional attack…”
Získat plný text
Journal Article