Výsledky vyhledávání - "Hash based algorithms"

  1. 1

    IMPROVE DATA ENCRYPTION BY USING DIFFIE-HELLMAN AND DNA ALGORITHMS, AUTHENTICATED BY HMAC-HASH256 Autor Mustafa, Nada Abdul Aziz

    ISSN: 0976-5697, 0976-5697
    Vydáno: Udaipur International Journal of Advanced Research in Computer Science 20.08.2025
    “…: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications…”
    Získat plný text
    Journal Article
  2. 2

    The Impact of Quantum Computing on Present Cryptography Autor Mavroeidis, Vasileios, Vishi, Kamer, D., Mateusz, Jøsang, Audun

    ISSN: 2158-107X, 2156-5570
    Vydáno: West Yorkshire Science and Information (SAI) Organization Limited 2018
    “… In particular the reader can delve into the following subjects: present cryptographic schemes…”
    Získat plný text
    Journal Article
  3. 3

    AAU-Net: Attention-Based Asymmetric U-Net for Subject-Sensitive Hashing of Remote Sensing Images Autor Ding, Kaimeng, Chen, Shiping, Wang, Yu, Liu, Yueming, Zeng, Yue, Tian, Jin

    ISSN: 2072-4292, 2072-4292
    Vydáno: Basel MDPI AG 01.12.2021
    Vydáno v Remote sensing (Basel, Switzerland) (01.12.2021)
    “… As a special subset of perceptual hashing, subject-sensitive hashing overcomes the shortcomings of the existing perceptual hashing that cannot distinguish…”
    Získat plný text
    Journal Article
  4. 4

    Analysis of Histopathological Images for Early Diagnosis of Oral Squamous Cell Carcinoma by Hybrid Systems Based on CNN Fusion Features Autor Ahmed, Ibrahim Abdulrab, Senan, Ebrahim Mohammed, Shatnawi, Hamzeh Salameh Ahmad

    ISSN: 0884-8173, 1098-111X
    Vydáno: New York Hindawi 2023
    “… Manual diagnosis is still subject to errors and differences in doctors’ opinions, especially in the early stages…”
    Získat plný text
    Journal Article
  5. 5

    A New Subject-Sensitive Hashing Algorithm Based on Multi-PatchDrop and Swin-Unet for the Integrity Authentication of HRRS Image Autor Ding, Kaimeng, Wang, Yingying, Wang, Chishe, Ma, Ji

    ISSN: 2220-9964, 2220-9964
    Vydáno: Basel MDPI AG 01.09.2024
    “…Transformer-based subject-sensitive hashing algorithms exhibit good integrity authentication performance and have the potential to ensure the authenticity and convenience of high-resolution remote sensing (HRRS) images…”
    Získat plný text
    Journal Article
  6. 6

    Secret-Key Exchange Through Synchronization of Randomized Chaotic Oscillators Aided by Logistic Hash Function Autor Onuki, Koshiro, Cho, Kenichiro, Horio, Yoshihiko, Miyano, Takaya

    ISSN: 1549-8328, 1558-0806
    Vydáno: New York IEEE 01.04.2022
    “… Two legitimate users are assumed to possess chaotic oscillators subject to the original Lorenz equations to exchange randomized chaotic signals…”
    Získat plný text
    Journal Article
  7. 7

    Randomization of message contents with and without encryption for covert communication scenarios: Randomization of Message Contents With and Without Encryption for Covert Communication Scenarios Autor Rajba, Paweł, Keller, Jörg, Mazurczyk, Wojciech

    ISSN: 1615-5262, 1615-5270
    Vydáno: Berlin/Heidelberg Springer Berlin Heidelberg 01.02.2026
    “…Steganographic methods often presuppose that the concealed message appears random upon encoding. When confidentiality is a concern, encryption results in a…”
    Získat plný text
    Journal Article
  8. 8

    A New Subject-Sensitive Hashing Algorithm Based on MultiRes-RCF for Blockchains of HRRS Images Autor Ding, Kaimeng, Chen, Shiping, Yu, Jiming, Liu, Yanan, Zhu, Jie

    ISSN: 1999-4893, 1999-4893
    Vydáno: Basel MDPI AG 01.06.2022
    Vydáno v Algorithms (01.06.2022)
    “…) images, we propose a new subject-sensitive hashing algorithm specially for HRRS image blockchains…”
    Získat plný text
    Journal Article
  9. 9

    Data-Dependent Hashing Based on p-Stable Distribution Autor Bai, Xiao, Yang, Haichuan, Zhou, Jun, Ren, Peng, Cheng, Jian

    ISSN: 1057-7149, 1941-0042, 1941-0042
    Vydáno: United States IEEE 01.12.2014
    Vydáno v IEEE transactions on image processing (01.12.2014)
    “… Each projection vector is a linear combination of multiple random vectors subject to p-stable distribution, in which the weights for the linear combination are learned based on the training data…”
    Získat plný text
    Journal Article
  10. 10

    A secure data transmission and efficient data balancing approach for 5G‐based IoT data using UUDIS‐ECC and LSRHS‐CNN algorithms Autor Yadav, Kusum, Jain, Anurag, Alharbi, Yasser, Alferaidi, Ali, Alkwai, Lulwah M., Ahmed, Nada Mohamed Osman Sid, Hamad, Sawsan Ali Saad

    ISSN: 1751-8628, 1751-8636
    Vydáno: Stevenage John Wiley & Sons, Inc 01.03.2022
    Vydáno v IET communications (01.03.2022)
    “…Due to the realization of 5G technology, the Internet of things (IoT) has made remarkable advancements in recent years. However, security along with data…”
    Získat plný text
    Journal Article
  11. 11

    SLOW HASHING SPEED AS A PROTECTION FOR WEAK PASSWORDS Autor Carter, Anthony, Johnson, Richard

    ISSN: 2304-7712, 2304-7720
    Vydáno: Chung-Li Educational Research Multimedia & Publications 01.06.2020
    “… However, the majority of individuals likely use weak passwords for convenience. If a database is breached and a password hash is subject to a dictionary-based…”
    Získat plný text
    Journal Article
  12. 12

    Semi-U-Net: A Lightweight Deep Neural Network for Subject-Sensitive Hashing of HRRS Images Autor Ding, Kaimeng, Su, Shoubao, Xu, Nan, Jiang, Tingting

    ISSN: 2169-3536, 2169-3536
    Vydáno: Piscataway IEEE 2021
    Vydáno v IEEE access (2021)
    “…As a special case of perceptual hashing algorithm, subject-sensitive hashing can realize "subject-biased" integrity authentication of high resolution remote sensing (HRRS…”
    Získat plný text
    Journal Article
  13. 13

    Use of locality sensitive hashing (LSH) algorithm to match Web of Science and Scopus Autor Abdulhayoglu, Mehmet Ali, Thijs, Bart

    ISSN: 0138-9130, 1588-2861
    Vydáno: Cham Springer International Publishing 01.08.2018
    Vydáno v Scientometrics (01.08.2018)
    “…A novel hashing algorithm is applied to match two prominent and important bibliographic databases at the paper level. In the literature, such tasks have been…”
    Získat plný text
    Journal Article
  14. 14

    A flexible image encryption algorithm based on 3D CTBCS and DNA computing Autor Xu, Ji, Mou, Jun, Xiong, Li, Li, Peng, Hao, Jin

    ISSN: 1380-7501, 1573-7721
    Vydáno: New York Springer US 01.07.2021
    Vydáno v Multimedia tools and applications (01.07.2021)
    “…In this paper, a novel image encryption algorithm based on a new discrete chaotic system is presented. The chaotic characteristics of the new chaotic system…”
    Získat plný text
    Journal Article
  15. 15

    Exploration and Practice of the Acquisition Path of Spoken English for Special Purposes with the Blockchain Technology Autor Ruan, Yali

    ISSN: 1574-017X, 1875-905X
    Vydáno: Amsterdam Hindawi 16.08.2022
    Vydáno v Mobile information systems (16.08.2022)
    “…With the increasing trend of globalization, English, as the most widely used language in the world, has become a subject that many people must learn…”
    Získat plný text
    Journal Article
  16. 16

    Web Applications Login Authentication Scheme Using Hybrid Cryptography with User Anonymity Autor Bello Alhaji Buhari, Afolayan, Ayodele Obiniyi

    ISSN: 2074-9023, 2074-9031
    Vydáno: Hong Kong Modern Education and Computer Science Press 01.10.2022
    “… Present schemes have limitations such as users spent a lot of time browsing to create image portfolios than to create passwords and PINs, subject to active impersonation attack, some will only suit…”
    Získat plný text
    Journal Article
  17. 17

    Reliable Security Algorithm for Drones Using Individual Characteristics From an EEG Signal Autor Singandhupe, Ashutosh, La, Hung Manh, Feil-Seifer, David

    ISSN: 2169-3536, 2169-3536
    Vydáno: Piscataway IEEE 01.01.2018
    Vydáno v IEEE access (01.01.2018)
    “…; scientific research involving UAVs has encompassed a wide range of scientific study. However, communication with unmanned vehicles are subject to attack and compromise…”
    Získat plný text
    Journal Article
  18. 18

    Research on Multimedia Technology-Assisted College English Grammar Teaching Autor Xu, Huarui, Yao, Yun

    ISSN: 1530-8669, 1530-8677
    Vydáno: Oxford Hindawi 2022
    “…The English Curriculum Standard for Compulsory Education lists the specific requirements for the integration of English discipline and information technology…”
    Získat plný text
    Journal Article
  19. 19

    Secure Authentication Framework for SDN-IoT network using Keccak-256 and Bliss-B algorithms Autor Sahana, D. S., Brahmananda, S. H.

    ISSN: 2511-2104, 2511-2112
    Vydáno: Singapore Springer Nature Singapore 01.01.2023
    “… The SDN, on the other hand, is particularly subject to attacks since it relies on a centralised controller for network management, which attackers can simply alter…”
    Získat plný text
    Journal Article
  20. 20

    A 3D Image Encryption Algorithm Based on the Chaotic System and the Image Segmentation Autor Xu, Ji, Zhao, Chen, Mou, Jun

    ISSN: 2169-3536, 2169-3536
    Vydáno: Piscataway IEEE 01.01.2020
    Vydáno v IEEE access (01.01.2020)
    “… The security analysis shows that the proposed 3D image file encryption algorithm possesses higher security features to preserve the subject and resist conventional attack…”
    Získat plný text
    Journal Article