Hash function

Sort By:
Page 4 of 50 - About 500 essays
  • Decent Essays

    P r e e t V i m a l c h a n d J a i n P a g e | 1 Homework 3 CS 696 Network Management and Security Fall 2014 1. Have you thought more the project? How would you measure your success on the project? What are some concrete objectives and how much work do you think is involved? Yes I have thought more about the project as well searching and reading research papers so that I can get overview and understand the concepts in detail. I would measure it as it will help me to learn the skills of networking

    • 1766 Words
    • 8 Pages
    Decent Essays
  • Better Essays

    I. INTRODUCTION Claimed to be the successor of the Internet for its booming popularity, Bitcoin has recently surpassed yet another benchmark. The Economist reports on the 25th of May 2017 that one bitcoin is now valued more than twice the price of an ounce of Gold, more precisely and less figuratively, more than $2,600. However, Bitcoin’s revolutionary idea stems from the way it builds its own cryptosystem. Disregarding the bank or any central authority for that manner, Bitcoin sows a global, interconnected

    • 1050 Words
    • 5 Pages
    Better Essays
  • Decent Essays

    There are many popular authentication protocol schemes and some of them are as follows. Lightweight Dynamic User Authentication Scheme – In Wireless Sensor Networks the authorized users can access and communicate with the sensor nodes. This scheme comprises of registration, login and authentication phases. Based on the predefined period the user registers and gets access to secure data and restarts if period expires. It states it is secure only against replay and forgery attacks. And provides many

    • 1111 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    A guide to evaluating voice and SMS API providers for two-factor authentication solutions Introduction Today, users of online services are very familiar with the process of typing in a username and password, to securely access their accounts. Passwords however, are no longer considered very safe, as they can be easily stolen, sniffed, guessed, or obtained through methods such as phishing and malware attacks. Even strong and complicated passwords are susceptible to theft and therefore not the best

    • 2635 Words
    • 11 Pages
    Decent Essays
  • Better Essays

    FINGERPRINT BASED AUTHENTICATION SYSTEM USING MERKLE HASH ALGORITHM IN CLOUD COMPUTING SHAIK RASHEEDA BEGUM Department of Information Technology B.S.Abdur Rahman University Chennai, Tamil Nadu, India E-mail: rasheeameen@gmail.com LATHA TAMILSELVAN Department of Information Technology B.S.Abdur Rahman University Chennai, Tamil Nadu, India E-mail: Latha.Tamilselvan94 @gmail.com Abstract— Cloud computing has been envisioned as the next generation architecture of the IT enterprise

    • 3721 Words
    • 15 Pages
    Better Essays
  • Better Essays

    III. OBFUSCATION OF SMART METER DATA A. Need for cryptography During the process of transmission of information, it is almost impossible to prevent eavesdropping. The transmission of smart meter readings is often done over an insecure channel. The privacy related issues become the focal point determining the future of the smart meter technology. In this paper, we propose a novel method to secure the smart meter readings using the concept of cryptography [15]. Cryptography refers to the art of securing

    • 1596 Words
    • 7 Pages
    Better Essays
  • Better Essays

    ADVANCED RAILWAY RESEVATION SYSTEM Jitesh Bhoir VIVA Institute of Technology Bhoir.jitesh12@ hotmail.com Malaika Mulla VIVA Institute of Technology malaikamulla.9218@ gmail.com Ragini Kale VIVA Institute of Technology raginikale10@ gmail.com Nikita Patil VIVA Institute of Technology nikita.patil@ vivacollege.org ABSTRACT In our country railways have become prominent. Our system consists of solution for reservation, planning and managing railway transportation. It includes the idea of

    • 1132 Words
    • 5 Pages
    Better Essays
  • Better Essays

    identifying number associated with these transactions. Pairs of digests are likewise hashed. This is carried out until the node has encoded all of the transactions it has received (this yields the data structure known as the “Merkle Tree”) and then has a hash that is a representative identifier of all of the transaction history. A

    • 1261 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Blockchain Technology and the Bitcoin Revolution Chris Hokett, University of Oklahoma/Boise State University Kai Huang, Boise State University Jacob Margrave, Boise State University The bitcoin and its underlying technology known as the blockchain, are currently being recognized as the beginning of a new “industrial revolution”. This technology has resulted in making the bitcoin the first-ever decentralized currency in existence. The digital currency itself is created as a reward in a competition

    • 2145 Words
    • 9 Pages
    Better Essays
  • Decent Essays

    grows over time, we have three options: 1. Choose hash function based on current file size. Get performance degradation as file grows. 2. Choose hash function based on anticipated file size. Space is wasted initially. 3. Periodically re-organize hash structure as file grows. Requires selecting new hash function, re-computing all addresses and generating new bucket assignments which are very costly. Some hashing techniques allow the hash function to be modified dynamically to accommodate the growth

    • 1758 Words
    • 8 Pages
    Decent Essays