Works matching DE "MESSAGE authentication codes"
Results: 186
Secure Data Encryption Through a Combination of AES, RSA and HMAC.
- Published in:
- Engineering, Technology & Applied Science Research, 2017, v. 7, n. 4, p. 1781, doi. 10.48084/etasr.1272
- By:
- Publication type:
- Article
Scientometric Analysis and Knowledge Mapping of Cybersecurity.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 3, p. 1177, doi. 10.14569/ijacsa.2024.01503117
- By:
- Publication type:
- Article
Enhancing Communication Security in Drones Using QRNG in Frequency Hopping Spread Spectrum.
- Published in:
- Future Internet, 2024, v. 16, n. 11, p. 412, doi. 10.3390/fi16110412
- By:
- Publication type:
- Article
Secure WiFi-Direct Using Key Exchange for IoT Device-to-Device Communications in a Smart Environment.
- Published in:
- Future Internet, 2019, v. 11, n. 12, p. 251, doi. 10.3390/fi11120251
- By:
- Publication type:
- Article
An active detection of compromised nodes based on en-route trap in wireless sensor network.
- Published in:
- International Journal of Distributed Sensor Networks, 2021, v. 17, n. 8, p. 1, doi. 10.1177/15501477211040367
- By:
- Publication type:
- Article
Experimental performance analysis of lightweight block ciphers and message authentication codes for wireless sensor networks.
- Published in:
- International Journal of Distributed Sensor Networks, 2017, v. 13, n. 11, p. 1, doi. 10.1177/1550147717744169
- By:
- Publication type:
- Article
VP<sup>2</sup>RQ: Efficient verifiable privacy-preserving range query processing in two-tiered wireless sensor networks.
- Published in:
- International Journal of Distributed Sensor Networks, 2016, v. 12, n. 11, p. 1, doi. 10.1177/1550147716675627
- By:
- Publication type:
- Article
Partitioning-Based Data Sharing Approach for Data Integrity Verification in Distributed Fog Computing.
- Published in:
- International Journal of Engineering & Technology Innovation, 2023, v. 13, n. 2, p. 160, doi. 10.46604/ijeti.2023.10685
- By:
- Publication type:
- Article
A Step towards the Efficiency of Collisions in the Wireless Sensor Networks.
- Published in:
- EAI Endorsed Transactions on Scalable Information Systems, 2019, v. 6, n. 22, p. 1, doi. 10.4108/eai.13-7-2018.159409
- By:
- Publication type:
- Article
Hashing and Message Authentication Code Implementation. An Embedded Approach.
- Published in:
- Scientific Bulletin 'Mircea cel Batran' Naval Academy, 2019, v. 22, n. 2, p. 1, doi. 10.21279/1454-864X-19-I2-035
- By:
- Publication type:
- Article
Optimized mobility management protocol for the IoT based WBAN with an enhanced security.
- Published in:
- Wireless Networks (10220038), 2021, v. 27, n. 1, p. 537, doi. 10.1007/s11276-020-02470-5
- By:
- Publication type:
- Article
A priority-based CCA threshold adjusting method for EWM dissemination in vehicular ad-hoc networks.
- Published in:
- Wireless Networks (10220038), 2015, v. 21, n. 5, p. 1563, doi. 10.1007/s11276-014-0870-3
- By:
- Publication type:
- Article
A secure authentication scheme for VANETs with batch verification.
- Published in:
- Wireless Networks (10220038), 2015, v. 21, n. 5, p. 1733, doi. 10.1007/s11276-014-0881-0
- By:
- Publication type:
- Article
KEYED HASH FUNCTION FROM LARGE GIRTH EXPANDER GRAPHS.
- Published in:
- Albanian Journal of Mathematics, 2022, v. 16, n. 1, p. 25, doi. 10.51286/albjm/1656414764
- By:
- Publication type:
- Article
Securing a Web-Based Hospital Management System Using a Combination of AES and HMAC.
- Published in:
- Iraqi Journal for Electrical & Electronic Engineering, 2023, v. 19, n. 1, p. 93, doi. 10.37917/ijeee.19.1.12
- By:
- Publication type:
- Article
A Holistic Secure Communication Mechanism Using a Multilayered Cryptographic Protocol to Enhanced Security.
- Published in:
- Computers, Materials & Continua, 2024, v. 78, n. 3, p. 4417, doi. 10.32604/cmc.2024.046797
- By:
- Publication type:
- Article
Intrusion Detection Model Using Chaotic MAP for Network Coding Enabled Mobile Small Cells.
- Published in:
- Computers, Materials & Continua, 2024, v. 78, n. 3, p. 3151, doi. 10.32604/cmc.2023.043534
- By:
- Publication type:
- Article
Chosen-Ciphertext Attack Secure Public-Key Encryption with Keyword Search.
- Published in:
- Computers, Materials & Continua, 2022, v. 73, n. 1, p. 69, doi. 10.32604/cmc.2022.026751
- By:
- Publication type:
- Article
Building a Trust Model for Secure Data Sharing (TM-SDS) in Edge Computing Using HMAC Techniques.
- Published in:
- Computers, Materials & Continua, 2022, v. 71, n. 3, p. 4183, doi. 10.32604/cmc.2022.019802
- By:
- Publication type:
- Article
Message Authentication with a New Quantum Hash Function.
- Published in:
- Computers, Materials & Continua, 2019, v. 59, n. 2, p. 635, doi. 10.32604/cmc.2019.05251
- By:
- Publication type:
- Article
Low-Cost and Secure Communication System for SCADA System of Remote Microgrids.
- Published in:
- Journal of Electrical & Computer Engineering, 2019, p. 1, doi. 10.1155/2019/1986325
- By:
- Publication type:
- Article
An Effective Metaheuristic Based Dynamic Fine Grained Data Security Framework for Big Data.
- Published in:
- Wireless Personal Communications, 2024, v. 137, n. 4, p. 2441, doi. 10.1007/s11277-024-11506-4
- By:
- Publication type:
- Article
PIoT-blockchain-enabled security framework for strengthening IoT device identity and data access.
- Published in:
- Journal of Control & Decision, 2024, v. 11, n. 4, p. 803, doi. 10.1080/23307706.2024.2327081
- By:
- Publication type:
- Article
Open Sensor Manager for IIoT.
- Published in:
- Journal of Sensor & Actuator Networks, 2020, v. 9, n. 2, p. 30, doi. 10.3390/jsan9020030
- By:
- Publication type:
- Article
Towards Privacy Preserving in 6G Networks: Verifiable Searchable Symmetric Encryption Based on Blockchain.
- Published in:
- Applied Sciences (2076-3417), 2023, v. 13, n. 18, p. 10151, doi. 10.3390/app131810151
- By:
- Publication type:
- Article
Prevention of Controller Area Network (CAN) Attacks on Electric Autonomous Vehicles.
- Published in:
- Applied Sciences (2076-3417), 2023, v. 13, n. 16, p. 9374, doi. 10.3390/app13169374
- By:
- Publication type:
- Article
MAC-Based Compression Ratio Improvement for CAN Security.
- Published in:
- Applied Sciences (2076-3417), 2023, v. 13, n. 4, p. 2654, doi. 10.3390/app13042654
- By:
- Publication type:
- Article
A Framework for Reversible Data Embedding into Base45 and Other Non-Base64 Encoded Strings.
- Published in:
- Applied Sciences (2076-3417), 2022, v. 12, n. 1, p. 241, doi. 10.3390/app12010241
- By:
- Publication type:
- Article
SENTINEL: A Secure and Efficient Authentication Framework for Unmanned Aerial Vehicles.
- Published in:
- Applied Sciences (2076-3417), 2020, v. 10, n. 9, p. 3149, doi. 10.3390/app10093149
- By:
- Publication type:
- Article
Vulnerabilities and Limitations of MQTT Protocol Used between IoT Devices.
- Published in:
- Applied Sciences (2076-3417), 2019, v. 9, n. 5, p. 848, doi. 10.3390/app9050848
- By:
- Publication type:
- Article
A computationally efficient HMAC-based authentication scheme for network coding.
- Published in:
- Telecommunication Systems, 2022, v. 79, n. 1, p. 47, doi. 10.1007/s11235-021-00842-6
- By:
- Publication type:
- Article
Authentication and Key Agreement Algorithm for Handover of Next-Generation High-Speed Railway.
- Published in:
- Security & Communication Networks, 2023, p. 1, doi. 10.1155/2023/2929889
- By:
- Publication type:
- Article
Single-Frame-Based Data Compression for CAN Security.
- Published in:
- Information (2078-2489), 2024, v. 15, n. 3, p. 132, doi. 10.3390/info15030132
- By:
- Publication type:
- Article
5G-IPAKA: An Improved Primary Authentication and Key Agreement Protocol for 5G Networks.
- Published in:
- Information (2078-2489), 2022, v. 13, n. 3, p. 125, doi. 10.3390/info13030125
- By:
- Publication type:
- Article
Algebraic Fault Analysis of SHA-256 Compression Function and Its Application.
- Published in:
- Information (2078-2489), 2021, v. 12, n. 10, p. 433, doi. 10.3390/info12100433
- By:
- Publication type:
- Article
S-GoSV: Framework for Generating Secure IEC 61850 GOOSE and Sample Value Messages.
- Published in:
- Energies (19961073), 2019, v. 12, n. 13, p. 2536, doi. 10.3390/en12132536
- By:
- Publication type:
- Article
Enhanced Message Authentication Encryption Scheme Based on Physical- Layer Key Generation in Resource-Limited Internet of Things.
- Published in:
- KSII Transactions on Internet & Information Systems, 2024, v. 18, n. 9, p. 2546, doi. 10.3837/tiis.2024.09.005
- By:
- Publication type:
- Article
Efficient Geographical Information-Based En-route Filtering Scheme in Wireless Sensor Networks.
- Published in:
- KSII Transactions on Internet & Information Systems, 2018, v. 12, n. 9, p. 4183, doi. 10.3837/tiis.2018.09.005
- By:
- Publication type:
- Article
Fully secure non-monotonic access structure CP-ABE scheme.
- Published in:
- KSII Transactions on Internet & Information Systems, 2018, v. 12, n. 3, p. 1315, doi. 10.3837/tiis.2018.03.019
- By:
- Publication type:
- Article
RPIDA: Recoverable Privacy-preserving Integrity-assured Data Aggregation Scheme for Wireless Sensor Networks.
- Published in:
- KSII Transactions on Internet & Information Systems, 2015, v. 9, n. 12, p. 5189, doi. 10.3837/tiis.2015.12.025
- By:
- Publication type:
- Article
Look-Up Table Based Implementations of SHA-3 Finalists: JH, Keccak and Skein.
- Published in:
- KSII Transactions on Internet & Information Systems, 2012, v. 6, n. 9, p. 2388, doi. 10.3837/tiis.2012.09.024
- By:
- Publication type:
- Article
Real Time Related Key Attack on Hummingbird-2.
- Published in:
- KSII Transactions on Internet & Information Systems, 2012, v. 6, n. 8, p. 1946, doi. 10.3837/tiis.2012.08.004
- By:
- Publication type:
- Article
Security Model for Tree-based Routing in Wireless Sensor Networks: Structure and Evaluation.
- Published in:
- KSII Transactions on Internet & Information Systems, 2012, v. 6, n. 4, p. 1223, doi. 10.3837/tiis.2012.04.016
- By:
- Publication type:
- Article
INSIDE THE MIND OF A HACKER.
- Published in:
- Elevator World, 2019, v. 67, n. 10, p. 90
- By:
- Publication type:
- Article
Secure quantum network coding based on quantum homomorphic message authentication.
- Published in:
- Quantum Information Processing, 2019, v. 18, n. 1, p. 1, doi. 10.1007/s11128-018-2127-z
- By:
- Publication type:
- Article
Utilizing Asymmetric Cryptography and Advanced Hashing Algorithms for Securing Communication Channels in IoT Networks Against Cyber Espionage.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 13, n. 1, p. 46, doi. 10.54216/JCIM.130105
- By:
- Publication type:
- Article
完整内部安全的混合签密方案设计与分析.
- Published in:
- Journal of South China Normal University (Natural Science Edition) / Huanan Shifan Daxue Xuebao (Ziran Kexue Ban), 2022, v. 54, n. 6, p. 119, doi. 10.6054/j.jscnun.2022093
- By:
- Publication type:
- Article
Linkable message tagging: solving the key distribution problem of signature schemes.
- Published in:
- International Journal of Information Security, 2017, v. 16, n. 3, p. 281, doi. 10.1007/s10207-016-0327-z
- By:
- Publication type:
- Article
Perceptual hash function for scalable video.
- Published in:
- International Journal of Information Security, 2014, v. 13, n. 1, p. 81, doi. 10.1007/s10207-013-0211-z
- By:
- Publication type:
- Article
Aggregate message authentication codes (AMACs) with on-the-fly verification.
- Published in:
- International Journal of Information Security, 2013, v. 12, n. 6, p. 495, doi. 10.1007/s10207-013-0202-0
- By:
- Publication type:
- Article