[PDF][PDF] Cryptographic hash functions: a review
Cryptographic Hash Functions: A Review Page 1 Cryptographic Hash Functions: A Review Rajeev
Sobti1, G.Geetha2 1School of Computer Science, Lovely Professional University Phagwara …
Sobti1, G.Geetha2 1School of Computer Science, Lovely Professional University Phagwara …
Blockchain 1.0 to blockchain 4.0—The evolutionary transformation of blockchain technology
Blockchain is a propitious technology that has gained immense popularity and tractions. It
has tremendously revolutionized the peer-to-peer information exchange by combining …
has tremendously revolutionized the peer-to-peer information exchange by combining …
[HTML][HTML] A survey on blockchain consensus with a performance comparison of PoW, PoS and pure PoS
Blockchain technology started as the backbone for cryptocurriencies and it has emerged as
one of the most interesting technologies of the last decade. It is a new paradigm able to …
one of the most interesting technologies of the last decade. It is a new paradigm able to …
[PDF][PDF] Cryptographic approach to “privacy-friendly” tags
Cryptographic Approach to “Privacy-Friendly” Tags Cryptographic Approach to “Privacy-Friendly”
Tags Page 1 © copyright NTT Information Sharing Platform Laboratories Cryptographic …
Tags Page 1 © copyright NTT Information Sharing Platform Laboratories Cryptographic …
Efficient quantum-based security protocols for information sharing and data protection in 5G networks
Fifth generation (5G) networks aim at utilizing many promising communication technologies,
such as Cloud Computing, Network Slicing, and Software Defined Networking. Supporting a …
such as Cloud Computing, Network Slicing, and Software Defined Networking. Supporting a …
Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers
D Henrici, P Muller - IEEE Annual Conference on Pervasive …, 2004 - ieeexplore.ieee.org
Radio-frequency identification devices (RFID) may emerge as one of the most pervasive
computing technologies in history. On the one hand, with tags affixed to consumer items as …
computing technologies in history. On the one hand, with tags affixed to consumer items as …
[PDF][PDF] Security and privacy in radio-frequency identification devices
SA Weis - 2003 - dspace.mit.edu
Abstract Radio Frequency Identification (RFID) systems are a common and useful tool in
manufacturing, supply chain management and retail inventory control. Optical barcodes …
manufacturing, supply chain management and retail inventory control. Optical barcodes …
[PDF][PDF] Integrity Auditing of Outsourced Data.
An increasing number of enterprises outsource their IT services to third parties who can offer
these services for a much lower cost due to economy of scale. Quality of service is a major …
these services for a much lower cost due to economy of scale. Quality of service is a major …
ZHT: A light-weight reliable persistent dynamic scalable zero-hop distributed hash table
This paper presents ZHT, a zero-hop distributed hash table, which has been tuned for the
requirements of high-end computing systems. ZHT aims to be a building block for future …
requirements of high-end computing systems. ZHT aims to be a building block for future …
A robust image fingerprinting system using the Radon transform
With the ever-increasing use of multimedia contents through electronic commerce and on-
line services, the problems associated with the protection of intellectual property …
line services, the problems associated with the protection of intellectual property …