Search Results - "Keccak-256 hashing algorithm"
Search alternatives:
- "Keccak-256 hashing algorithm" »
-
1
Secure Authentication Framework for SDN-IoT network using Keccak-256 and Bliss-B algorithms
ISSN: 2511-2104, 2511-2112Published: Singapore Springer Nature Singapore 01.01.2023Published in International journal of information technology (Singapore. Online) (01.01.2023)“… Initially, all the users and applications are registered with attributes by using the keccak-256 hashing algorithm based on the registration, the Authentication…”
Get full text
Journal Article -
2
Deploying a Cryptocurrency Technique Using Hashing and Web Integration
ISSN: 2769-2884Published: IEEE 14.03.2024Published in Proceedings (International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (14.03.2024)“…) and the Keccak-256 hashing algorithm into Down-Coin, a cryptocurrency platform. ECC is utilized for robust key generation and digital signatures, while Keccak-256 ensures secure transaction hashing…”
Get full text
Conference Proceeding -
3
Smart Verification System for Media File Using Blockchain
Published: IEEE 09.05.2022Published in 2022 International Conference on Applied Artificial Intelligence and Computing (ICAAIC) (09.05.2022)“…In this modern world where information is stored and shared in digital manner in the format of image, video, document privacy and authenticity of the data…”
Get full text
Conference Proceeding