Leveraging Blockchain as a Solution for Security Issues and Challenges of Paperless E-Governance Application
暂无分享,去创建一个
[1] Maurice Herlihy,et al. Attacking memory-hard scrypt with near-data-processing , 2019, MEMSYS.
[2] P. N. Sindhuja,et al. Reducing Forgery in Land Registry System Using Blockchain Technology , 2018, Communications in Computer and Information Science.
[3] Vinay Kumar,et al. A Solution to Secure Personal Data When Aadhaar is linked with DigiLocker , 2018 .
[4] Jean-Marie Le Bars,et al. Performance of Password Guessing Enumerators Under Cracking Conditions , 2019, SEC.
[5] Alex Biryukov,et al. The memory-hard Argon2 password hash function , 2015 .
[6] Esmael Verano Maliberan,et al. Modified SHA1: A Hashing Solution to Secure Web Applications through Login Authentication , 2019, Int. J. Commun. Networks Inf. Secur..
[7] Alex Biryukov,et al. Argon2: New Generation of Memory-Hard Functions for Password Hashing and Other Applications , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[8] A. Panwar,et al. Digital-Locker Services in India , 2020 .
[9] Rohit Mandrekar,et al. Cryptanalysis of bcrypt and SHA-512 using Distributed Processing over the Cloud , 2015 .
[10] Rahul V. Dagade,et al. “Electronic Secure Vehicle Verification System Using Advanced Digi-Locker System” , 2018, 2018 3rd International Conference for Convergence in Technology (I2CT).
[11] Josip Knezovic,et al. Are Your Passwords Safe: Energy-Efficient Bcrypt Cracking with Low-Cost Parallel Hardware , 2014, WOOT.
[12] Ralf Zimmermann,et al. High-speed implementation of bcrypt password search using special-purpose hardware , 2014, 2014 International Conference on ReConFigurable Computing and FPGAs (ReConFig14).
[13] Jos Wetzels. Open Sesame: The Password Hashing Competition and Argon2 , 2016, IACR Cryptol. ePrint Arch..
[14] Seth James Nielson,et al. More Symmetric Crypto: Authenticated Encryption and Kerberos , 2019 .