Author:
Ahmad Imtiaz,Shoba Das A.
Subject
Electrical and Electronic Engineering,General Computer Science,Control and Systems Engineering
Reference21 articles.
1. Network security: private communication in a public world;Kaufman,2002
2. FIPS Publication 198. The Keyed-hash message authentication code (HMAC). US Doc/NIST, March 6, 2002.
3. Madson C, Glenn R. The use of HMAC-SHA-1-96 within ESP and AH. RFC 2404, November 1998.
4. Rivest RL. The MD5 message digest algorithm. RFC 1321, April 1992.
5. FIPS Publication 180-1. Secure hash standard (SHS). US Doc/NIST, April 17, 1995.
Cited by
32 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Poster: Embedded-Based Differentiated Communication for Remote ECG Monitoring with a Multi-Level Blockchain System;2024 33rd International Conference on Computer Communications and Networks (ICCCN);2024-07-29
2. Mathematics as a basis for the generation of cryptographic tools;Ingenieria Solidaria;2023-12-20
3. UVM Components for the Secure Hash 512 Algorithm;2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT);2023-07-06
4. COVID-19 Vehicle Based on an Efficient Mutual Authentication Scheme for 5G-Enabled Vehicular Fog Computing;International Journal of Environmental Research and Public Health;2022-11-24
5. Watermark based Image Authentication using Integer Wavelet Transform;2022 International Conference on Inventive Computation Technologies (ICICT);2022-07-20