-
101
A Hybrid Cryptography Scheme for NILM Data Security
Published 2020-07-01“…The classical algorithm HMAC-SHA1 (Hash Message Authentication Codes-Secure Hash Algorithm 1) was further developed to guarantee the integrity of data. …”
Get full text
Article -
102
Secure Medical Image Communication Using Fragile Data Hiding Based on Discrete Wavelet Transform and A₅ Lattice Vector Quantization
Published 2023-01-01“…Secure communication of medical images is essential to telemedicine. Message Authentication Codes (MAC) can be embedded inside medical images to protect their integrity. …”
Get full text
Article -
103
Secure Data Aggregation Based on End-to-End Homomorphic Encryption in IoT-Based Wireless Sensor Networks
Published 2023-07-01“…Such an approach could also employ message authentication codes (MAC) to validate data integrity throughout data aggregation and transmission activities, allowing fraudulent content to also be identified as soon as feasible. …”
Get full text
Article -
104
Parallel Implementation of Lightweight Secure Hash Algorithm on CPU and GPU Environments
Published 2024-02-01“…Currently, cryptographic hash functions are widely used in various applications, including message authentication codes, cryptographic random generators, digital signatures, key derivation functions, and post-quantum algorithms. …”
Get full text
Article -
105