One-way cryptographic hash function securing networks

VA Athavale, S Arora, A Athavale, R Yadav - Proceedings of Academia …, 2022 - Springer
Due to the rapid growth of Internet technologies, voluminous data is generated every minute
from multifarious sources. It is impossible for conventional tools to analyse and process such …

[PDF][PDF] Empirical evaluation of data hashing algorithms for password checks in PHP webapps using salt and pepper

OO Ajayi, TF Fanala - Comput Inf Syst Dev Inf Allied Res J, 2017 - academia.edu
Authentication is key in any network setting. It is an act of verifying and disallowing the
penetration of false or fake data. The quest to ensure adequate authentication gave rise to …

Novel Cryptographic Hashing Technique for Preserving Integrity in Forensic Samples

S Pooja, V Sagar, R Tanwar - Unleashing the Art of Digital …, 2022 - api.taylorfrancis.com
Cryptography hash functions are the fundamental building blocks for information security
and have plenty of security applications to protect the data integrity and authentication such …

[PDF][PDF] A new one-way cryptography hash function for WSN

RK Chauhan - Vivekananda J Res, 2019 - researchgate.net
Hash functions are used to protect the integrity and authentication of information. The most
popular cryptography hashing techniques are MD5, SHA-1 and HMAC. Due to the recent …

[PDF][PDF] An enhanced web security for cloud-based password management

RO Oladipupo, AO Olajide - 2019 - aujst.com
Password is a security mechanism for securing application and its contents by preventing
unauthorized users' access, using secure means. Breaches of access by unauthorized users …

[PDF][PDF] An Illustrative Approach for Secure Key Based Authentication for Cloud Communication

R Purohit - mitacsc.ac.in
The most reasonable and affordable technology to store bulk of data either related to an
individual or of related to a big organization, is cloud technology. Cloud technology provides …

[PDF][PDF] GENERAL KNOWLEDGE OF SQL DATABASE

FT FREDRICK - academia.edu
In 1970 Dr. EF Codd published his paper,“A Relational Model of Data for Large Shared Data
Banks”. This became the foundation for the relational database system. This paper …

[PDF][PDF] A DHT ORIENTED PEER TO PEER NETWORK WITH NEW HASH FUNCTION

V SAINI, KP YADAV - ijsir.in
Now a days P2P networks are widely used for voice and video communications and also in
many transactions like file sharing. In P2P networks DHT (Distributed Hash Table) oriented …

Implementation of hashed cryptography algorithm based on cryptography message syntax

MA Ali - 2019 - eprints.uthm.edu.my
This design and simulation research is conducted in CMC network security (message
encryption context). The design will use MATLAB encryption to show simulation. The coding …

[PDF][PDF] A DHT Oriented Peer To Peer Network with New Hash Function

A Saroliya, R Purohit, U Mishra, A Rana, A Bansal - Citeseer
Nowadays P2P networks are widely used for voice & video communications and also in
many transactions like file sharing. In P2P networks DHT (Distributed Hash Table) oriented …