Works matching DE "MESSAGE authentication codes"
Results: 183
An optical-based encryption and authentication algorithm for color and grayscale medical images.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 15, p. 23735, doi. 10.1007/s11042-022-14093-3
- By:
- Publication type:
- Article
Cryptographic Transitions: Historical Considerations.
- Published in:
- ISSA Journal, 2022, v. 20, n. 9, p. 16
- By:
- Publication type:
- Article
News That You Can Use...
- Published in:
- ISSA Journal, 2021, v. 19, n. 2, p. 13
- Publication type:
- Article
The Many Ways of BYOK.
- Published in:
- ISSA Journal, 2021, v. 19, n. 2, p. 37
- By:
- Publication type:
- Article
Quantum Cryptography: Myths, Legends, and Hypothesis.
- Published in:
- ISSA Journal, 2021, v. 19, n. 1, p. 22
- By:
- Publication type:
- Article
Enhancing Industrial Robot Arms Data Security with a Hybrid Encryption Approach.
- Published in:
- Sakarya University Journal of Science (SAUJS) / Sakarya Üniversitesi Fen Bilimleri Enstitüsü Dergisi, 2024, v. 28, n. 4, p. 756, doi. 10.16984/saufenbilder.1440949
- By:
- Publication type:
- Article
Enhancing Communication Security in Drones Using QRNG in Frequency Hopping Spread Spectrum.
- Published in:
- Future Internet, 2024, v. 16, n. 11, p. 412, doi. 10.3390/fi16110412
- By:
- Publication type:
- Article
Secure WiFi-Direct Using Key Exchange for IoT Device-to-Device Communications in a Smart Environment.
- Published in:
- Future Internet, 2019, v. 11, n. 12, p. 251, doi. 10.3390/fi11120251
- By:
- Publication type:
- Article
SDATA: Symmetrical Device Identifier Composition Engine Complied Aggregate Trust Attestation.
- Published in:
- Symmetry (20738994), 2024, v. 16, n. 3, p. 310, doi. 10.3390/sym16030310
- By:
- Publication type:
- Article
A Single-Key Variant of LightMAC_Plus.
- Published in:
- Symmetry (20738994), 2021, v. 13, n. 10, p. 1818, doi. 10.3390/sym13101818
- By:
- Publication type:
- Article
CASH BOX.
- Published in:
- Financial History, 2013, n. 107, p. 32
- By:
- Publication type:
- Article
Reusable Data-Path Architecture for Encryption-then-Authentication on FPGA.
- Published in:
- International Review on Computers & Software, 2016, v. 11, n. 1, p. 56, doi. 10.15866/irecos.v11i1.8367
- By:
- Publication type:
- Article
Performance Analysis of MAC Schemes in Wireless Sensor Networks.
- Published in:
- International Review on Computers & Software, 2013, v. 8, n. 12, p. 2831
- By:
- Publication type:
- Article
Secured and Encrypted Data Aggregation with Message Authentication Code in Wireless Sensor Networks.
- Published in:
- International Review on Computers & Software, 2013, v. 8, n. 10, p. 2327
- By:
- Publication type:
- Article
Quantum Cryptanalysis of Symmetric Primitives by Improving Relaxed Variants of Simon's Algorithm.
- Published in:
- ISeCure, 2023, v. 15, n. 1, p. 83, doi. 10.22042/ISECURE.2022.321346.739
- By:
- Publication type:
- Article
Indifferentiability security of the fast wide pipe hash: Breaking the birthday barrier.
- Published in:
- Journal of Mathematical Cryptology, 2016, v. 10, n. 2, p. 101, doi. 10.1515/jmc-2014-0044
- By:
- Publication type:
- Article
An active detection of compromised nodes based on en-route trap in wireless sensor network.
- Published in:
- International Journal of Distributed Sensor Networks, 2021, v. 17, n. 8, p. 1, doi. 10.1177/15501477211040367
- By:
- Publication type:
- Article
Experimental performance analysis of lightweight block ciphers and message authentication codes for wireless sensor networks.
- Published in:
- International Journal of Distributed Sensor Networks, 2017, v. 13, n. 11, p. 1, doi. 10.1177/1550147717744169
- By:
- Publication type:
- Article
VP<sup>2</sup>RQ: Efficient verifiable privacy-preserving range query processing in two-tiered wireless sensor networks.
- Published in:
- International Journal of Distributed Sensor Networks, 2016, v. 12, n. 11, p. 1, doi. 10.1177/1550147716675627
- By:
- Publication type:
- Article
SE-GPSR: Secured and Enhanced Greedy Perimeter Stateless Routing Protocol for Vehicular Ad hoc Networks.
- Published in:
- International Journal of Interactive Mobile Technologies, 2020, v. 14, n. 13, p. 48, doi. 10.3991/ijim.v14i13.14537
- By:
- Publication type:
- Article
Quantum based flexible secure authentication protocol (SAP) for device to device (D2D) communication.
- Published in:
- Optical & Quantum Electronics, 2023, v. 55, n. 9, p. 1, doi. 10.1007/s11082-023-05018-x
- By:
- Publication type:
- Article
Functional Message Authentication Codes With Message and Function Privacy.
- Published in:
- IET Information Security (Wiley-Blackwell), 2024, v. 2024, p. 1, doi. 10.1049/ise2/1969519
- By:
- Publication type:
- Article
Fault attacks on authenticated encryption modes for GIFT.
- Published in:
- IET Information Security (Wiley-Blackwell), 2022, v. 16, n. 1, p. 51, doi. 10.1049/ise2.12041
- By:
- Publication type:
- Article
Tightly Secure Hierarchical Identity-Based Encryption.
- Published in:
- Journal of Cryptology, 2020, v. 33, n. 4, p. 1787, doi. 10.1007/s00145-020-09356-x
- By:
- Publication type:
- Article
Efficient Authentication from Hard Learning Problems.
- Published in:
- Journal of Cryptology, 2017, v. 30, n. 4, p. 1238, doi. 10.1007/s00145-016-9247-3
- By:
- Publication type:
- Article
New Second-Preimage Attacks on Hash Functions.
- Published in:
- Journal of Cryptology, 2016, v. 29, n. 4, p. 657, doi. 10.1007/s00145-015-9206-4
- By:
- Publication type:
- Article
New Proofs for NMAC and HMAC: Security without Collision Resistance.
- Published in:
- Journal of Cryptology, 2015, v. 28, n. 4, p. 844, doi. 10.1007/s00145-014-9185-x
- By:
- Publication type:
- Article
面向RFID的轻量级双向认证协议.
- Published in:
- Journal of Computer Engineering & Applications, 2023, v. 59, n. 18, p. 268, doi. 10.3778/j.issn.1002-8331.2205-0362
- By:
- Publication type:
- Article
Index.
- Published in:
- Nacha Operating Rules & Guidelines, 2022, p. 408
- Publication type:
- Article
SECTION VII: Appendices: APPENDIX K. Mapping.
- Published in:
- Nacha Operating Rules & Guidelines, 2022, p. 354
- Publication type:
- Article
SECTION III: Receiving Depository Financial Institutions: CHAPTER 24. Receipt and Processing of ACH Files.
- Published in:
- Nacha Operating Rules & Guidelines, 2022, p. 103
- Publication type:
- Article
SECTION III: Receiving Depository Financial Institutions: CHAPTER 23. Relationship with Receiver.
- Published in:
- Nacha Operating Rules & Guidelines, 2022, p. 101
- Publication type:
- Article
APPENDIX THREE: ACH Record Format Specifications: PART 3.1 Record Formats.
- Published in:
- Nacha Operating Rules & Guidelines, 2022, p. 82
- Publication type:
- Article
DEVELOPMENT OF A MODIFIED UMAC ALGORITHM BASED ON CRYPTO-CODE CONSTRUCTIONS.
- Published in:
- Eastern-European Journal of Enterprise Technologies, 2020, v. 106, n. 9, p. 45, doi. 10.15587/1729-4061.2020.210683
- By:
- Publication type:
- Article
A Novel Compressive Image Encryption with an Improved 2D Coupled Map Lattice Model.
- Published in:
- Security & Communication Networks, 2021, p. 1, doi. 10.1155/2021/6625579
- By:
- Publication type:
- Article
Single-Frame-Based Data Compression for CAN Security.
- Published in:
- Information (2078-2489), 2024, v. 15, n. 3, p. 132, doi. 10.3390/info15030132
- By:
- Publication type:
- Article
5G-IPAKA: An Improved Primary Authentication and Key Agreement Protocol for 5G Networks.
- Published in:
- Information (2078-2489), 2022, v. 13, n. 3, p. 125, doi. 10.3390/info13030125
- By:
- Publication type:
- Article
Algebraic Fault Analysis of SHA-256 Compression Function and Its Application.
- Published in:
- Information (2078-2489), 2021, v. 12, n. 10, p. 433, doi. 10.3390/info12100433
- By:
- Publication type:
- Article
Design and Implementation of Security Function According to Routing Method in Automotive Gateway.
- Published in:
- International Journal of Automotive Technology, 2021, v. 22, n. 1, p. 19, doi. 10.1007/s12239-021-0003-9
- By:
- Publication type:
- Article
Design and Implementation of Security Function According to Routing Method in Automotive Gateway.
- Published in:
- International Journal of Automotive Technology, 2021, v. 22, n. 1, p. 19, doi. 10.1007/s12239-021-0003-9
- By:
- Publication type:
- Article
Homomorphic Subspace MAC Scheme for Secure Network Coding.
- Published in:
- ETRI Journal, 2013, v. 35, n. 1, p. 173, doi. 10.4218/etrij.13.0212.0166
- By:
- Publication type:
- Article
One-way information reconciliation schemes of quantum key distribution.
- Published in:
- Cybersecurity (2523-3246), 2019, v. 2, n. 1, p. N.PAG, doi. 10.1186/s42400-019-0033-z
- By:
- Publication type:
- Article
3D Model Fragile Watermarking Scheme for Authenticity Verification.
- Published in:
- Advances in Science & Technology Research Journal, 2024, v. 18, n. 8, p. 351, doi. 10.12913/22998624/194146
- By:
- Publication type:
- Article
Implementation of message authentication code using DNA-LCG key and a novel hash algorithm.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2019, v. 9, n. 1, p. 352, doi. 10.11591/ijece.v9i1.pp352-358
- By:
- Publication type:
- Article
LESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communication.
- Published in:
- Computing, 2016, v. 98, n. 7, p. 685, doi. 10.1007/s00607-014-0393-x
- By:
- Publication type:
- Article
Automated Cybersecurity Tester for IEC61850-Based Digital Substations.
- Published in:
- Energies (19961073), 2022, v. 15, n. 21, p. 7833, doi. 10.3390/en15217833
- By:
- Publication type:
- Article
S-GoSV: Framework for Generating Secure IEC 61850 GOOSE and Sample Value Messages.
- Published in:
- Energies (19961073), 2019, v. 12, n. 13, p. 2536, doi. 10.3390/en12132536
- By:
- Publication type:
- Article
Low-Cost and Secure Communication System for SCADA System of Remote Microgrids.
- Published in:
- Journal of Electrical & Computer Engineering, 2019, p. 1, doi. 10.1155/2019/1986325
- By:
- Publication type:
- Article
Real Time Related Key Attack on Hummingbird-2.
- Published in:
- KSII Transactions on Internet & Information Systems, 2012, v. 6, n. 8, p. 1946, doi. 10.3837/tiis.2012.08.004
- By:
- Publication type:
- Article
Security Model for Tree-based Routing in Wireless Sensor Networks: Structure and Evaluation.
- Published in:
- KSII Transactions on Internet & Information Systems, 2012, v. 6, n. 4, p. 1223, doi. 10.3837/tiis.2012.04.016
- By:
- Publication type:
- Article