-
1Conference
Source: 2025 International Conference on Recent Innovation in Science Engineering and Technology (ICRISET) Recent Innovation in Science Engineering and Technology (ICRISET), 2025 International Conference on. :1-9 Aug, 2025
Relation: 2025 International Conference on Recent Innovation in Science Engineering and Technology (ICRISET)
-
2Academic Journal
Authors: Valivarthi, Dharma TejaAff1, IDs10586025052940_cor1, Peddi, Sreekar, Narla, Swapna, Kethu, Sai Sathish, Natarajan, Durai Rajesh, Kurniadi, Dede
Linked Full TextSource: Cluster Computing: The Journal of Networks, Software Tools and Applications. 28(10)
-
3Academic Journal
Authors: Kyumin Sim, Hyunseok Son, Seokjun Yu, Hae Chul Hwang, Jong Hyun Song, Seung‐heon Chris Baek, Hamin Park
Source: Advanced Electronic Materials, Vol 11, Iss 19, Pp n/a-n/a (2025)
Subject Terms: flash memory, hash‐based message authentication code (HMAC), HMAC‐based key derivation function (HKDF), multi‐level, physically unclonable function (PUF), Electric apparatus and materials. Electric circuits. Electric networks, TK452-454.4, Physics, QC1-999
File Description: electronic resource
Linked Full TextRelation: https://doaj.org/toc/2199-160X
-
4Academic Journal
Authors: Gouse, Nida Kousar ⁎, Chandra Sekaran, Gopala Krishnan
Linked Full TextSource: In Sustainable Computing: Informatics and Systems December 2025 48
-
5Academic Journal
Authors: Upadhyay, D., Gaikwad, N., Zaman, M., Sampalli, S.
Source: IEEE Access Access, IEEE. 10:112472-112486 2022
Linked Full Text -
6Conference
Authors: Abdelrahman, A., Khaled, H., Shaaban, Eman, Elkilani, Wail S.
Source: 2020 15th International Conference on Computer Engineering and Systems (ICCES) Computer Engineering and Systems (ICCES), 2020 15th International Conference on. :1-6 Dec, 2020
Relation: 2020 15th International Conference on Computer Engineering and Systems (ICCES)
-
7Academic Journal
Authors: Lawrence, LinjuAff1, Aff2, IDs11227025069963_cor1, Shreelekshmi, R.Aff2, Aff3
Linked Full TextSource: The Journal of Supercomputing: An International Journal of High-Performance Computer Design, Analysis, and Use. 81(4)
-
8Academic Journal
Authors: Kamatchi, K.Aff1, IDs1122702406752z_cor1, Uma, E.Aff1
Linked Full TextSource: The Journal of Supercomputing: An International Journal of High-Performance Computer Design, Analysis, and Use. 81(1)
-
9Academic Journal
Authors: CHEN Junbo, ZOU Junyang, ZHANG Tianyu
Source: Kongzhi Yu Xinxi Jishu, Pp 104-109 (2024)
Subject Terms: embedded system, software upgrade, rail transit, security, hash-based message authentication code(HMAC) algorithm, cyclic redundancy check(CRC), Control engineering systems. Automatic machinery (General), TJ212-225, Technology
File Description: electronic resource
-
10Academic Journal
Contributors: I have not received any fund from any organization.
Source: Indonesian Journal of Electrical Engineering and Computer Science; Vol 40, No 2: November 2025; 780-788 ; 2502-4760 ; 2502-4752 ; 10.11591/ijeecs.v40.i2
Subject Terms: Security, Blockchain, data Sharing, Hash value, Hash-based message authentication code, Secret yey, Secure hash algorithm
File Description: application/pdf
Relation: https://ijeecs.iaescore.com/index.php/IJEECS/article/view/40475/19657; https://ijeecs.iaescore.com/index.php/IJEECS/article/view/40475
-
11eBook
Contributors: Jajodia, Sushil, editorAff1, Samarati, Pierangela, editorAff2, Yung, Moti, editorAff3
Source: Encyclopedia of Cryptography, Security and Privacy. :1109-1109
-
12Conference
Authors: Vishnupriya, T H, Vareed, Jucy
Source: 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT) Inventive Communication and Computational Technologies (ICICCT), 2018 Second International Conference on. :239-243 Apr, 2018
Relation: 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT)
-
13Academic Journal
Authors: Marcin Matczuk, Grzegorz Kozieł, Sławomir Cięszczyk
Source: Applied Sciences, Vol 15, Iss 13, p 7246 (2025)
Subject Terms: 3D model, cybersecurity, integrity protection, fragile watermarking, hash-based message authentication code, Technology, Engineering (General). Civil engineering (General), TA1-2040, Biology (General), QH301-705.5, Physics, QC1-999, Chemistry, QD1-999
File Description: electronic resource
-
14Academic Journal
Authors: Hussain, S.M.S., Farooq, S.M., Ustun, T.S.
Source: IEEE Access Access, IEEE. 7:80980-80984 2019
Linked Full Text -
15Academic Journal
Source: IEEE Access, Vol 11, Pp 73080-73087 (2023)
Linked Full TextSubject Terms: FOS: Computer and information sciences, Artificial intelligence, Chaotic Maps, Data Authentication Algorithm, User Authentication Methods and Security Measures, Chaotic, Hash-based message authentication code, Set (abstract data type), Noise (video), Message authentication code, 7. Clean energy, user authentication, Theoretical computer science, Computer security, security attacks, Theory and Applications of Cellular Automata, Image (mathematics), physical layer, Code (set theory), Authentication, Physical layer, Chaos-based Image Encryption Techniques, Graphical Passwords, Continuous Authentication, 16. Peace & justice, Computer science, TK1-9971, Process (computing), Programming language, Operating system, unconditional security, Computational Theory and Mathematics, Authentication (law), Computer Science, Physical Sciences, Hash function, Cryptography, Wireless, Telecommunications, Electrical engineering. Electronics. Nuclear engineering, Computer Vision and Pattern Recognition, Authentication protocol, Chaotic sequence, Information Systems
-
16Academic Journal
Authors: Pramod Kumar Maurya, Haradhan Ghosh, Satya Bagchi
Source: IEEE Access, Vol 11, Pp 10563-10577 (2023)
Linked Full TextSubject Terms: Replay attack, Alternative medicine, Otway–Rees protocol, Computer Networks and Communications, Hash-based message authentication code, Aerospace Engineering, FOS: Mechanical engineering, Remote User Authentication, 02 engineering and technology, privacy, Message authentication code, Cryptographic protocol, Reflection attack, RFID Technology and Applications, Database, Engineering, Computer security, Media Technology, Pathology, 0202 electrical engineering, electronic engineering, information engineering, MDS code, Antenna Design and Applications, Wide Mouth Frog protocol, Security Protocols for Authentication and Key Exchange, RFID, Authentication, Computer network, Security analysis, anonymity set, Scalability, Computer science, Challenge-Handshake Authentication Protocol, TK1-9971, group homomorphism, Algorithm, RFID system, Authentication (law), Physical Sciences, Computer Science, Protocol (science), Cryptography, Security Protocols, Medicine, Electrical engineering. Electronics. Nuclear engineering, Authentication protocol, Correctness, Authentication Protocol
-
17eBook
Authors: Jhaveri, JayAff5, Gupta, AbhayAff5, Chhabria, PremAff5, Ochani, NeerajAff5, Sengupta, SharmilaAff5, Suralkar, SunitaAff5, Dugad, ShashiAff6
Contributors: Xhafa, Fatos, Series EditorAff1, Hemanth, Jude, editorAff2, Pelusi, Danilo, editorAff3, Chen, Joy Iong-Zong, editorAff4
Source: Intelligent Cyber Physical Systems and Internet of Things : ICoICI 2022. 3:545-562
-
18Academic Journal
Authors: Syabdan Dalimunthe, Joeharsyah Reza, Asep Marzuki
Source: Journal of Applied Engineering and Technological Science, Vol 3, Iss 2 (2022)
-
19Conference
Authors: Yakut, Selman, Ozer, A. Bedri
Source: 2014 22nd Signal Processing and Communications Applications Conference (SIU) Signal Processing and Communications Applications Conference (SIU), 2014 22nd. :1563-1566 Apr, 2014
Relation: 2014 22nd Signal Processing and Communications Applications Conference (SIU)
-
20Academic Journal
Authors: Purushothaman, V., Sivasamy, Jeevitha, Karthik, S., Choubey, Abhishek, Prakash, S. P., Sheeba, T. Blesslin
Source: International Journal of Intelligent Systems and Applications in Engineering; Vol. 12 No. 2s (2024); 453-466
Subject Terms: Protected Optimal Path-Routing Protocol, HMAC (Hash-based Message Authentication Code), TACIT ((E-TACIT), Fuzzy C-Means Clustering based Energy-Efficient (FCCEE), 7. Clean energy
File Description: application/pdf