Articles with "hash based" as a keyword



Photo from wikipedia

An efficient hash-based authenticated key agreement scheme for multi-server architecture resilient to key compromise impersonation

Sign Up to like & get
recommendations!
Published in 2020 at "Digital Communications and Networks"

DOI: 10.1016/j.dcan.2020.05.001

Abstract: Abstract During the past decade, rapid advances in wireless communication technologies have made it possible for users to access desired services using hand-held devices. Service providers have hosted multiple servers to ensure seamless online services… read more here.

Keywords: hash based; scheme; authenticated key; multi server ... See more keywords
Photo by lucabravo from unsplash

Hash-Based Conditional Privacy Preserving Authentication and Key Exchange Protocol Suitable for Industrial Internet of Things

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2941701

Abstract: Wireless sensor networks (WSN) are integral part of Industrial Internet of Things (IIOT), the said networks comprise of elements possessing low power processors. WSNs are used for gathering data in the monitoring region, using which… read more here.

Keywords: exchange; proposed work; hash based; internet things ... See more keywords
Photo by alexbemore from unsplash

Investigating the Avalanche Effect of Various Cryptographically Secure Hash Functions and Hash-Based Applications

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3215778

Abstract: In modern cryptography, hash functions are considered as one of the key components for secure communication. They play a vital role in a wide range of applications such as ensuring the authentication and integrity of… read more here.

Keywords: based applications; hash; hash functions; hash based ... See more keywords
Photo from wikipedia

Fast Hash-Based Inter-Block Matching for Screen Content Coding

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Transactions on Circuits and Systems for Video Technology"

DOI: 10.1109/tcsvt.2016.2643701

Abstract: In the latest High Efficiency Video Coding (HEVC) development, i.e., HEVC screen content coding extensions (HEVC-SCC), a hash-based inter-motion search/block matching scheme is adopted in the reference test model, which brings significant coding gains to… read more here.

Keywords: hash; block; hash based; scheme ... See more keywords
Photo by dtopkin1 from unsplash

Hash-based and privacy-aware movie recommendations in a big data environment

Sign Up to like & get
recommendations!
Published in 2020 at "International Journal of Embedded Systems"

DOI: 10.1504/ijes.2020.10025052

Abstract: Movie recommendation is an important activity in the people's daily entertainment. Typically, through analysing the users' ever-watched movie list, a movie recommender system can recommend appropriate new movies to the target user. However, traditional movie… read more here.

Keywords: privacy aware; recommendation; hash based; movie recommendation ... See more keywords