-
1
Enhancement data integrity checking using combination MD5 and SHA1 algorithm in Hadoop architecture
Published 2017“…Therefore, this study aims to improve the functions available in Hue using MD5 and SHA1 cryptographic functions for data verification purposes. …”
Article -
2
-
3
Integrating security services into active network
Published 2005“…The results demonstrated that the authentication based on RIPEMD320 was faster than MD5 and SHA-512., and SHA-512 is more secure than the others.…”
Get full text
Thesis -
4
-
5
-
6
Dynamic hashing technique for bandwidth reduction in image transmission
Published 2015“…The proposed algorithm had achieved the lowest dynamic size (1 KB) with no fix length of the original file compared to MD5, SHA-1 and SHA-2 hash algorithms. The robustness of hashed message was tested against the substitution, replacement and collision attacks to check whether or not there is any detection of the same message in the output. …”
Get full text
Thesis -
7
-
8
-
9
Seeing with new eyes: becoming a narrative inquirer in higher education practice
Published 2013Book Section -
10
-
11
Neoliberal colonialism?: A postcolonial reading of "land grabbing" in Africa
Published 2016Book Section -
12
-
13
-
14
Threshold resonances and eigenvalues of some schrödinger operators on lattices
Published 2016Article -
15
-
16
Biomechanics in dentistry: evaluation of different surgical approaches to treat atrophic maxilla patients
Published 2013Book Section -
17
The impact of knowledge management, brand orientation and global marketing strategy on performance
Published 2014Book Section -
18
-
19
Quantitative and qualitative factors that leads to slip and fall incidents
Published 2017Book Section -
20
Effects of number of connections and pipe length to the water losses in Melaka
Published 2017Get full text
Article