hash function

Explore academic connections and research related to this keyword

144
Views
6
Total Connections

Related Articles & Bibliographies

1
An improved three-factor authentication scheme for patient monitoring using WSN in remote health-care system.
Soni, Preeti;Pal, Arup Kumar;Islam, Sk Hafizul;
2019 computer methods and programs in biomedicine DOI: S0169-2607(19)30362-... 249 views
2
fast software-oriented hash function based on data-dependent lookup operations
;Moldovyan N.A.;Summerville D.H.
2003 integrative medicine research 83 views
3
srfid: a hash-based security scheme for low cost rfid systems
;Walid I. Khedr
2013 restorative neurology and neuroscience DOI: 10.1016/j.eij.2013.0... 192 views
4
Simulation Analysis and Comparison of New Hybrid TLI-µTESLA and Variant TESLA Protocols Using SHA-2 and SHA-3 Hash Functions.
Eledlebi, Khouloud;Alzubaidi, Ahmed Adel;Yeob Yeun, Chan;Damiani, Ernesto;Mateu, Victor;Al-Hammadi,...
2022 sensors DOI: 9063 138 views

Related Journals

sensors
ISSN: 1424-8220 2,944 views

Related Research Groups

No Research Groups Found

No research groups are currently associated with this keyword.