Search Results - "Keccak-256 hashing algorithm"

Search alternatives:

  • Showing 1 - 3 results of 3
Refine Results
  1. 1

    Secure Authentication Framework for SDN-IoT network using Keccak-256 and Bliss-B algorithms by Sahana, D. S., Brahmananda, S. H.

    ISSN: 2511-2104, 2511-2112
    Published: Singapore Springer Nature Singapore 01.01.2023
    “… Initially, all the users and applications are registered with attributes by using the keccak-256 hashing algorithm based on the registration, the Authentication…”
    Get full text
    Journal Article
  2. 2

    Deploying a Cryptocurrency Technique Using Hashing and Web Integration by Patel, Shivam, Bathla, Ruchika, Gupta, Deepa

    ISSN: 2769-2884
    Published: IEEE 14.03.2024
    “…) and the Keccak-256 hashing algorithm into Down-Coin, a cryptocurrency platform. ECC is utilized for robust key generation and digital signatures, while Keccak-256 ensures secure transaction hashing…”
    Get full text
    Conference Proceeding
  3. 3

    Smart Verification System for Media File Using Blockchain by Siddique, S. Shireen, Fatima, N. Sabiyath

    Published: IEEE 09.05.2022
    “…In this modern world where information is stored and shared in digital manner in the format of image, video, document privacy and authenticity of the data…”
    Get full text
    Conference Proceeding