5,975 results on '"Message authentication code"'
Search Results
2. Toward Full n-bit Security and Nonce Misuse Resistance of Block Cipher-Based MACs
3. Security Analysis of CMAC in the Multi-user Model
4. Recommendation for block cipher modes of operation : the CCM mode for authentication and confidentiality
5. Interactive aggregate message authentication equipped with detecting functionality from adaptive group testing.
6. Guideline for implementing cryptography in the federal government
7. An Effective Metaheuristic Based Dynamic Fine Grained Data Security Framework for Big Data.
8. When and How to Aggregate Message Authentication Codes on Lossy Channels?
9. BEC Defender: QR Code-Based Methodology for Prevention of Business Email Compromise (BEC) Attacks.
10. Guaranteeing the integrity and reliability of distributed personal information access records.
11. 智能车载网络中匿名认证与密钥交换协议.
12. Forgery Attacks on Several Beyond-Birthday-Bound Secure MACs
13. A New Keyed Hash Function Based on Latin Squares and Error-Correcting Codes to Authenticate Users in Smart Home Environments
14. Design of Mutual Authentication Method for Deep Learning Based Hybrid Cryptography to Secure data in Cloud Computing.
15. Sponge-Based Parallel Authenticated Encryption With Variable Tag Length and Side-Channel Protection
16. Key-Reduced Variants of 3kf9 with Beyond-Birthday-Bound Security
17. An Effective Integrity Verification Scheme for Ensuring Data Integrity in Cloud Computing
18. Localized Tamper Detection in Digital Images Using Three Phase Reversible Watermarking
19. Secure, Efficient, Lightweight Authentication in Wireless Sensor Networks
20. A Solution to Support Integrity in the Lawful Interception Ecosystem
21. Single-Trace Side-Channel Analysis on Polynomial-Based MAC Schemes
22. Authenticated Encryption Schemes: A Systematic Review
23. Parallel Sponge-Based Authenticated Encryption With Side-Channel Protection and Adversary-Invisible Nonces
24. Investigating the Avalanche Effect of Various Cryptographically Secure Hash Functions and Hash-Based Applications
25. SPMAC: Scalable Prefix Verifiable Message Authentication Code for Internet of Things.
26. Robust Secure Routing Protocol for Mobile Ad Hoc Networks (MANETs)
27. Authentication, KDC, and Key Pre-distribution Techniques-Based Model for Securing AODV Routing Protocol in MANET
28. Protection of Information from Imitation on the Basis of Crypt-Code Structures
29. Implementation of Secure Sampled Value (SeSV) Messages in Substation Automation System.
30. Key Encapsulation Mechanism from Multilinear Maps
31. MergeMAC: A MAC for Authentication with Strict Time Constraints and Limited Bandwidth
32. Ubiquitous Weak-Key Classes of BRW-Polynomial Function
33. Dynamic Multi-Keyword Search for Secure Data Storage in the Cloud using Cuckoo Filter.
34. Crypto-Aided MAP Test for Low-Latency Detection of False Data in Short Packets.
35. SDA-SM: An Efficient Secure Data Aggregation Scheme using Separate MAC across Wireless Sensor Networks.
36. Highly Secure Nonce-based MACs from the Sum of Tweakable Block Ciphers
37. Hy-SAIL: Hyper-Scalability, Availability and Integrity Layer for Cloud Storage Systems
38. AN EFFICIENT HASH ALGORITHM TO PRESERVE DATA INTEGRITY
39. RBS RFID Security and the Internet of Things
40. Cryptography in RFID Systems
41. Computer Network Security Protocols
42. Cryptography
43. Secure Distributed Group Rekeying Scheme for Cluster Based Wireless Sensor Networks Using Multilevel Encryption
44. Quantum Authentication with Key Recycling
45. Quantum Authentication and Encryption with Key Recycling : Or: How to Re-use a One-Time Pad Even if — Safely & Feasibly
46. Fixing Cracks in the Concrete: Random Oracles with Auxiliary Input, Revisited
47. Codes for Detection of Limited View Algebraic Tampering
48. Phase 5: Quality-specific Pattern Analysis
49. Background
50. Phase 8: Software Architecture Alternatives Evaluation
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.