Enhancing Encryption Mechanisms using SHA-512 for user Authentication through Password & Face Recognition

A Vankadara, V Myneni, H Pendyala… - 2023 International …, 2023 - ieeexplore.ieee.org
Authentication is a process that is used to verify the identities of users, before allowing them
access to the system. Authentication technology controls access to systems by comparing a …

Comparative Analysis of Web Application Based Encryption Methods

Y Singh, S Singh, S Kandpal, C Bhatt… - … on Cybersecurity in …, 2022 - Springer
The login mechanism of the web base application currently uses the MD5 hash method
used for the encryption of the password. The current state has a weakness of Collision …

Application of Hash Sha-256 Algorithm in Website-Based Sales Software Engineering

FN Khasanah - Journal of Applied Data Sciences, 2022 - bright-journal.org
Rapid technological developments can spur changes in the cycle of human activities, one of
which is software engineering activities that continue to develop in accordance with …

[PDF][PDF] Security based approach of SHA 384 and SHA 512 algorithms in cloud environment

T Velmurugan, S Karthiga - J Comput Sci, 2020 - researchgate.net
Cloud computing is going to be the next big thing in the era of internet world. As the world
moves ahead towards enhancement of the cloud features we also have to take a serious …

Secure Chat Room Application Using AES-GCM Encryption and SHA-256

M Alkhyeli, S Alkhyeli, K Aldhaheri… - … on Innovations in …, 2023 - ieeexplore.ieee.org
This research paper investigates the security principles of a chatroom application. The study
aims to ensure the security and privacy of user information while maintaining user …

Secure Storage System Using Cryptographic Techniques

M AlShalaan, R AlSubaie, A Ara - … of Women in Data Science at …, 2022 - ieeexplore.ieee.org
In the era of Internet usage growth, storage services are widely used where users' can store
their data, while hackers techniques pose massive threats to users' data security. The …

Developing Web-Based Point of Sales Application with SHA-512 Encryption on DBMS for Indonesian MSME's Culinary Industry

R Fernando, J Wiratama - Journal of information systems and …, 2023 - journal-isi.org
Efficiency and effectiveness are crucial in the food & beverage industry. Conventional
methods employed by companies often lead to discrepancies between actual stock and the …

Face Recognition Based Password Encryption and Decryption System

VA Sawant, SD Vishwas, RA Giri… - 2023 4th …, 2023 - ieeexplore.ieee.org
With the growing importance of cybersecurity, secure encryption techniques have become
essential in protecting sensitive information. In this research, we propose a novel method for …

[PDF][PDF] Design and analysis of an enhanced sha-1 hash generation scheme for android mobile computers

B Padma, GVSR Kumar - International Journal of Applied …, 2016 - researchgate.net
Mobile security has turn out to be vital in mobile computing. People began preserving their
personal and business information on smart phones. Users and businesses utilize smart …

[PDF][PDF] Analysis of secure hash algorithm (SHA) 512 for encryption process on web based application

M Sumagita, I Riadi, J Sh… - International Journal of …, 2018 - researchgate.net
The login mechanism in web-based applications implements the MD5 hash function as a
form of password encryption that proves to have weaknesses in the form of Collision Attack …