[引用][C] Applied cryptography: protocols, algorithms, and source code in C

B Schneier - 2007 - john wiley & sons

[引用][C] Cryptography and network security, 4/E

W Stallings - 2006 - Pearson Education India

Retracted article: a multimodal biometric authentication scheme based on feature fusion for improving security in cloud environment

T Joseph, SA Kalaiselvan, SU Aswathy… - Journal of Ambient …, 2021 - Springer
In recent days, due to the advent of advanced technologies such as cloud computing,
accessing data can be done anywhere at any time. Meanwhile, ensuring the data security is …

System and method for managing data and policies

RPS Ahuja, J Christener, J Gaitonde, S Ganti… - US Patent …, 2014 - Google Patents
5,497,489 5,542,090 5,557,747 5,623,652 5,768,578 5,781,629 5,787,232 5,794,052
5,813,009 5,873,081 5,937,422 5,943,670 5,987,610 5,995,111 6,026,411 6,073,142 …

System and method for data mining and security policy management

RPS Ahuja, F Lakhani - US Patent 8,447,722, 2013 - Google Patents
(57) ABSTRACT A method is provided in one example and includes generating a query for a
database for information stored in the database. The information relates to data discovered …

Blockchain for ecologically embedded coffee supply chains

H Trollman, G Garcia-Garcia, S Jagtap, F Trollman - Logistics, 2022 - mdpi.com
Background: This research aims to identify how blockchain technology could support the
ecological embeddedness of the coffee supply chain. Ecological embeddedness is a subset …

MDx-MAC and building fast MACs from hash functions

B Preneel, PC Van Oorschot - Annual International Cryptology Conference, 1995 - Springer
We consider the security of message authentication code (MAC) algorithms, and the
construction of MACs from fast hash functions. A new forgery attack applicable to all iterated …

Secure patient authentication framework in the healthcare system using wireless medical sensor networks

SU Jan, S Ali, IA Abbasi, MAA Mosleh… - Journal of …, 2021 - Wiley Online Library
Biosensor is a means to transmit some physical phenomena, like body temperature, pulse,
respiratory rate, electroencephalogram (EEG), electrocardiogram (ECG), and blood …

Authenticated multi-party key agreement

M Just, S Vaudenay - … —ASIACRYPT'96: International Conference on the …, 1996 - Springer
We examine key agreement protocols providing (i) key authentication (ii) key confirmation
and (iii) forward secrecy. Attacks are presented against previous two-party key agreement …

Edible matrix code with photogenic silk proteins

JW Leem, HJ Jeon, Y Ji, SM Park, Y Kwak… - ACS Central …, 2022 - ACS Publications
Counterfeit medicines are a healthcare security problem, posing not only a direct threat to
patient safety and public health but also causing heavy economic losses. Current …