[PDF][PDF] Cryptographic hash functions: a review

R Sobti, G Geetha - International Journal of Computer Science Issues …, 2012 - Citeseer
Cryptographic Hash Functions: A Review Page 1 Cryptographic Hash Functions: A Review Rajeev
Sobti1, G.Geetha2 1School of Computer Science, Lovely Professional University Phagwara …

Blockchain 1.0 to blockchain 4.0—The evolutionary transformation of blockchain technology

P Mukherjee, C Pradhan - Blockchain technology: applications and …, 2021 - Springer
Blockchain is a propitious technology that has gained immense popularity and tractions. It
has tremendously revolutionized the peer-to-peer information exchange by combining …

[HTML][HTML] A survey on blockchain consensus with a performance comparison of PoW, PoS and pure PoS

C Lepore, M Ceria, A Visconti, UP Rao, KA Shah… - Mathematics, 2020 - mdpi.com
Blockchain technology started as the backbone for cryptocurriencies and it has emerged as
one of the most interesting technologies of the last decade. It is a new paradigm able to …

[PDF][PDF] Cryptographic approach to “privacy-friendly” tags

M Ohkubo, K Suzuki, S Kinoshita - RFID privacy workshop, 2003 - cop4708.pbworks.com
Cryptographic Approach to “Privacy-Friendly” Tags Cryptographic Approach to “Privacy-Friendly”
Tags Page 1 © copyright NTT Information Sharing Platform Laboratories Cryptographic …

Efficient quantum-based security protocols for information sharing and data protection in 5G networks

AA Abd EL-Latif, B Abd-El-Atty… - Future generation …, 2019 - Elsevier
Fifth generation (5G) networks aim at utilizing many promising communication technologies,
such as Cloud Computing, Network Slicing, and Software Defined Networking. Supporting a …

Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers

D Henrici, P Muller - IEEE Annual Conference on Pervasive …, 2004 - ieeexplore.ieee.org
Radio-frequency identification devices (RFID) may emerge as one of the most pervasive
computing technologies in history. On the one hand, with tags affixed to consumer items as …

[PDF][PDF] Security and privacy in radio-frequency identification devices

SA Weis - 2003 - dspace.mit.edu
Abstract Radio Frequency Identification (RFID) systems are a common and useful tool in
manufacturing, supply chain management and retail inventory control. Optical barcodes …

[PDF][PDF] Integrity Auditing of Outsourced Data.

M **e, H Wang, J Yin, X Meng - VLDB, 2007 - academia.edu
An increasing number of enterprises outsource their IT services to third parties who can offer
these services for a much lower cost due to economy of scale. Quality of service is a major …

ZHT: A light-weight reliable persistent dynamic scalable zero-hop distributed hash table

T Li, X Zhou, K Brandstatter, D Zhao… - 2013 IEEE 27th …, 2013 - ieeexplore.ieee.org
This paper presents ZHT, a zero-hop distributed hash table, which has been tuned for the
requirements of high-end computing systems. ZHT aims to be a building block for future …

A robust image fingerprinting system using the Radon transform

JS Seo, J Haitsma, T Kalker, CD Yoo - Signal Processing: Image …, 2004 - Elsevier
With the ever-increasing use of multimedia contents through electronic commerce and on-
line services, the problems associated with the protection of intellectual property …