A Novel Improvement With an Effective Expansion to Enhance the MD5 Hash Function for Verification of a Secure E-Document
暂无分享,去创建一个
[1] Mourade Azrour,et al. A New Secure SIP Authentication Scheme Based on Elliptic Curve Cryptography , 2017, ICIT 2017.
[2] Ariel M. Sison,et al. A Modified MD5 Algorithm Incorporating Hirose Compression Function , 2018, 2018 IEEE 10th International Conference on Humanoid, Nanotechnology, Information Technology,Communication and Control, Environment and Management (HNICEM).
[3] Di Xiao,et al. Block mode image encryption technique using two-fold operations based on chaos, MD5 and DNA rules , 2018, Multimedia Tools and Applications.
[4] Behrooz Khadem,et al. An Idea to Increase the Security of EAP-MD5 Protocol Against Dictionary Attack , 2018, ArXiv.
[5] R. B. Patel,et al. Capacity and interference aware link scheduling with channel assignment in wireless mesh networks , 2011, J. Netw. Comput. Appl..
[6] Miss Manorama Chauhan. An implemented of hybrid cryptography using elliptic curve cryptosystem (ECC) and MD5 , 2016, 2016 International Conference on Inventive Computation Technologies (ICICT).
[7] Xiaowen Zhang,et al. Modern Network Security Practices: Using Rainbow Tables to Solve Organizational Issues , 2018, 2018 IEEE 39th Sarnoff Symposium.
[8] Xiaowen Zhang,et al. Finding partial hash collisions by brute force parallel programming , 2017, 2017 IEEE Long Island Systems, Applications and Technology Conference (LISAT).
[9] R. B. Patel,et al. A Framework for Distributed Dynamic Load Balancing in Heterogeneous Cluster , 2007 .
[10] Rasha Subhi Ali,et al. Enhancement CAST block algorithm to encrypt big data , 2017, 2017 Annual Conference on New Trends in Information & Communications Technology Applications (NTICT).
[11] Christoforos Ntantogian,et al. Evaluation of password hashing schemes in open source web platforms , 2019, Comput. Secur..
[12] Shefali Ojha,et al. AES and MD5 based secure authentication in cloud computing , 2017, 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC).
[13] P. W. C. Prasad,et al. Enhancement of MD5 Algorithm for Secured Web Development , 2017, J. Softw..
[14] Jyoti Gupta,et al. A novel technique of cloud security based on hybrid encryption by Blowfish and MD5 , 2017, 2017 4th International Conference on Signal Processing, Computing and Control (ISPCC).
[15] Pan Wang,et al. An Improved Bloom Filter in Distributed Crawler , 2018, 2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI).
[16] Aman Shakya,et al. Enhancing MD5 hash algorithm using symmetric key encryption , 2019, ICCSP.
[17] Vaclav Prenosil,et al. Parallelization of Brute-Force Attack on MD5 Hash Algorithm on FPGA , 2019, 2019 32nd International Conference on VLSI Design and 2019 18th International Conference on Embedded Systems (VLSID).
[18] Larry B. de Guzman,et al. MD5 Secured Cryptographic Hash Value , 2018, MLMI2018.
[19] Risanuri Hidayat,et al. Increasing the security of mp3 steganography using AES Encryption and MD5 hash function , 2016, 2016 2nd International Conference on Science and Technology-Computer (ICST).
[20] Wayne Goodridge,et al. A Survey of Network-based Security Attacks , 2019, International Journal of Advanced Networking and Applications.
[21] Athanasios V. Vasilakos,et al. A Multi-Tenant Cloud-Based DC Nano Grid for Self-Sustained Smart Buildings in Smart Cities , 2017, IEEE Communications Magazine.
[22] F Alaa Kadhim,et al. Mouse Movement with 3D Chaotic Logistic Maps to Generate Random Numbers , 2017 .
[23] Himshai Kambo,et al. Secure data deduplication mechanism based on Rabin CDC and MD5 in cloud computing environment , 2017, 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT).
[24] Samee Ullah Khan,et al. The Sponge Structure Modulation Application to Overcome the Security Breaches for the MD5 and SHA-1 Hash Functions , 2019, 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC).
[25] Mohammed Ali,et al. DB Protection System Depend on Modified Hash Function , 2017 .
[26] Batyr Charyyev,et al. RIVA: Robust Integrity Verification Algorithm for High-Speed File Transfers , 2020, IEEE Transactions on Parallel and Distributed Systems.
[27] Priyanka Ora,et al. Data security and integrity in cloud computing based on RSA partial homomorphic and MD5 cryptography , 2015, 2015 International Conference on Computer, Communication and Control (IC4).
[28] Alaa Kadhim Farhan,et al. Enhancement of QR Code Capacity by Encrypted Lossless Compression Technology for Verification of Secure E-Document , 2020, IEEE Access.
[29] Alaa Kadhim Farhan,et al. A New S-Box Generation Algorithm Based on Multistability Behavior of a Plasma Perturbation Model , 2019, IEEE Access.
[30] Ariel M. Sison,et al. A New Approach in Expanding the Hash Size of MD5 , 2018, Int. J. Commun. Networks Inf. Secur..
[31] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[32] Irfan A. Landge,et al. Secured IoT Through Hashing Using MD5 , 2018, 2018 Fourth International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB).