Sign Up to like & get
recommendations!
0
Published in 2020 at "Digital Communications and Networks"
DOI: 10.1016/j.dcan.2020.05.001
Abstract: Abstract During the past decade, rapid advances in wireless communication technologies have made it possible for users to access desired services using hand-held devices. Service providers have hosted multiple servers to ensure seamless online services…
read more here.
Keywords:
hash based;
scheme;
authenticated key;
multi server ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "Physica Scripta"
DOI: 10.1088/1402-4896/ae11df
Abstract: Quantum secret sharing (QSS) is a fundamental primitive in quantum cryptography, enabling secure distribution of sensitive information among multiple parties. However, existing protocols often suffer from vulnerabilities such as collusion attacks, uneven share distribution, and…
read more here.
Keywords:
quantum secret;
measurement basis;
basis;
secret sharing ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2019 at "IEEE Access"
DOI: 10.1109/access.2019.2941701
Abstract: Wireless sensor networks (WSN) are integral part of Industrial Internet of Things (IIOT), the said networks comprise of elements possessing low power processors. WSNs are used for gathering data in the monitoring region, using which…
read more here.
Keywords:
exchange;
proposed work;
hash based;
internet things ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3215778
Abstract: In modern cryptography, hash functions are considered as one of the key components for secure communication. They play a vital role in a wide range of applications such as ensuring the authentication and integrity of…
read more here.
Keywords:
based applications;
hash;
hash functions;
hash based ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "IEEE Access"
DOI: 10.1109/access.2024.3485602
Abstract: The emergence of quantum computing poses significant risks to the security of current cryptographic systems, particularly those reliant on classical algorithms vulnerable to quantum attacks. This systematic literature review adopts the PRISMA model to critically…
read more here.
Keywords:
signature schemes;
based signature;
cryptography;
hash based ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2018 at "IEEE Transactions on Circuits and Systems for Video Technology"
DOI: 10.1109/tcsvt.2016.2643701
Abstract: In the latest High Efficiency Video Coding (HEVC) development, i.e., HEVC screen content coding extensions (HEVC-SCC), a hash-based inter-motion search/block matching scheme is adopted in the reference test model, which brings significant coding gains to…
read more here.
Keywords:
hash;
block;
hash based;
scheme ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "International Journal of Embedded Systems"
DOI: 10.1504/ijes.2020.10025052
Abstract: Movie recommendation is an important activity in the people's daily entertainment. Typically, through analysing the users' ever-watched movie list, a movie recommender system can recommend appropriate new movies to the target user. However, traditional movie…
read more here.
Keywords:
privacy aware;
recommendation;
hash based;
movie recommendation ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "Symmetry"
DOI: 10.3390/sym17060919
Abstract: The rapid development of quantum computing poses challenges to the foundations of traditional cryptography. The threats are significant in terms of both asymmetric cryptography (which exposes schemes like RSA and ECC to efficient attacks) and…
read more here.
Keywords:
post quantum;
signature;
cryptography;
hash based ... See more keywords