Journal articles on the topic 'Message authentication code (MAC)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Message authentication code (MAC).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Michail, H. E., G. Selimis, M. Galanis, D. Schinianakis, and C. E. Goutis. "Novel Hardware Implementation of the Cipher Message Authentication Code." Journal of Computer Systems, Networks, and Communications 2008 (2008): 1–6. http://dx.doi.org/10.1155/2008/923079.
Full textMousavi, Seyyed Mehdi, and Dr Mohammad Hossein Shakour. "Increasing Cryptographic Security Using Message Authentication Code (MAC)." International Journal of Engineering and Technology 11, no. 4 (August 31, 2019): 912–17. http://dx.doi.org/10.21817/ijet/2019/v11i4/191104073.
Full textEchandouri, Bouchra, Fouzia Omary, Fatima Ezzahra Ziani, and Anas Sadak. "SEC-CMAC A New Message Authentication Code Based on the Symmetrical Evolutionist Ciphering Algorithm." International Journal of Information Security and Privacy 12, no. 3 (July 2018): 16–26. http://dx.doi.org/10.4018/ijisp.2018070102.
Full textIchwan, M., Milda Gustian, and Novan Rizky Nurjaman. "Implementasi Keyed-Hash Message Authentatication Code Pada Sistem Keamanan Rumah." MIND Journal 1, no. 1 (May 12, 2018): 9. http://dx.doi.org/10.26760/mindjournal.v1i1.9.
Full textAbdulla, Abdulla, and Yaseen Ismaeel. "Applying Message Authentication Code (MAC) in text chatting system." TANMIYAT AL-RAFIDAIN 30, no. 92 (December 1, 2008): 9–18. http://dx.doi.org/10.33899/tanra.2008.161723.
Full textNoh, Jaewon, Sangil Jeon, and Sunghyun Cho. "Distributed Blockchain-Based Message Authentication Scheme for Connected Vehicles." Electronics 9, no. 1 (January 1, 2020): 74. http://dx.doi.org/10.3390/electronics9010074.
Full textHussain, S. M. Suhail, Shaik Mullapathi Farooq, and Taha Selim Ustun. "Analysis and Implementation of Message Authentication Code (MAC) Algorithms for GOOSE Message Security." IEEE Access 7 (2019): 80980–84. http://dx.doi.org/10.1109/access.2019.2923728.
Full textZivic, Natasa. "Principles of Soft Verification." International Journal of Distributed Systems and Technologies 4, no. 1 (January 2013): 1–15. http://dx.doi.org/10.4018/jdst.2013010101.
Full textMuraharirao, Siva Charan, and Manik Lal Das. "Digital Image Protection using Keyed Hash Function." International Journal of Computer Vision and Image Processing 2, no. 2 (April 2012): 36–47. http://dx.doi.org/10.4018/ijcvip.2012040103.
Full textJabiullah, Md Ismail, AA Md Monzur Ul Akhir, and Muhammed Rasheduzzaman. "A Double-Key Based Encryption-Decryption Process for Stronger Secured Message Transactions." GUB Journal of Science and Engineering 6, no. 1 (October 13, 2020): 75–80. http://dx.doi.org/10.3329/gubjse.v6i1.52053.
Full textSodhi, Gurpreet Kour, Gurjot Singh Gaba, Lavish Kansal, Mohamed El Bakkali, and Faisel Em Tubbal. "Implementation of message authentication code using DNA-LCG key and a novel hash algorithm." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 1 (February 1, 2019): 352. http://dx.doi.org/10.11591/ijece.v9i1.pp352-358.
Full textFarooq, Shaik Mullapathi, S. M. Suhail Hussain, and Taha Selim Ustun. "S-GoSV: Framework for Generating Secure IEC 61850 GOOSE and Sample Value Messages." Energies 12, no. 13 (July 1, 2019): 2536. http://dx.doi.org/10.3390/en12132536.
Full textBalakrishna, R., R. Anandan, and A. Sajeev Ram. "Erroneous message discovery with data acquisition and secret communication in cellular networks." International Journal of Engineering & Technology 7, no. 2.31 (May 29, 2018): 186. http://dx.doi.org/10.14419/ijet.v7i2.31.13437.
Full textLi, Ping, Tan Wang, Sitong Yan, Xiaoxu Yuan, and Zhiwen Liu. "Nursing Effect of Stellate Ganglion Block on Cerebral Infarction Based on Message Authentication Code Diameter Algorithm." Journal of Medical Imaging and Health Informatics 10, no. 2 (February 1, 2020): 410–15. http://dx.doi.org/10.1166/jmihi.2020.2880.
Full textSepúlveda, Johanna, Felix Wilgerodt, and Michael Pehl. "Towards memory integrity and authenticity of multi-processors system-on-chip using physical unclonable functions." it - Information Technology 61, no. 1 (February 25, 2019): 29–43. http://dx.doi.org/10.1515/itit-2018-0030.
Full textIsa, Mohd Anuar Mat, Miza Mumtaz Ahmad, Nor Fazlida Mohd Sani, Habibah Hashim, and Ramlan Mahmod. "Cryptographic Key Exchange Protocol with Message Authentication Codes (MAC) Using Finite State Machine." Procedia Computer Science 42 (2014): 263–70. http://dx.doi.org/10.1016/j.procs.2014.11.061.
Full textHakeem, Shimaa A. Abdel, Mohamed A. Abd El-Gawad, and HyungWon Kim. "Comparative Experiments of V2X Security Protocol Based on Hash Chain Cryptography." Sensors 20, no. 19 (October 8, 2020): 5719. http://dx.doi.org/10.3390/s20195719.
Full textXiao, Di, Qingqing Fu, Tao Xiang, and Yushu Zhang. "Chaotic Image Encryption of Regions of Interest." International Journal of Bifurcation and Chaos 26, no. 11 (October 2016): 1650193. http://dx.doi.org/10.1142/s0218127416501935.
Full textHoumer, Meriem, Mariya Ouaissa, Mariyam Ouaissa, and Moulay Lahcen Hasnaoui. "SE-GPSR: Secured and Enhanced Greedy Perimeter Stateless Routing Protocol for Vehicular Ad hoc Networks." International Journal of Interactive Mobile Technologies (iJIM) 14, no. 13 (August 14, 2020): 48. http://dx.doi.org/10.3991/ijim.v14i13.14537.
Full textIqbal, Amjad, and M. Tariq Iqbal. "Low-Cost and Secure Communication System for SCADA System of Remote Microgrids." Journal of Electrical and Computer Engineering 2019 (May 23, 2019): 1–12. http://dx.doi.org/10.1155/2019/1986325.
Full textNath Mishra, Kamta. "A Proficient Mechanism for Cloud Security Supervision in Distributive Computing Environment." International Journal of Computer Network and Information Security 12, no. 6 (December 8, 2020): 57–77. http://dx.doi.org/10.5815/ijcnis.2020.06.05.
Full textDel Prete, Giuseppe, Daniele Gallo, Carmine Landi, and Mario Luiso. "Real-time smart meters network for energy management." ACTA IMEKO 2, no. 1 (August 16, 2013): 40. http://dx.doi.org/10.21014/acta_imeko.v2i1.51.
Full textLiu, Zhuo, Yong Wang, Leo Yu Zhang, and Jun Ma. "A Novel Compressive Image Encryption with an Improved 2D Coupled Map Lattice Model." Security and Communication Networks 2021 (April 9, 2021): 1–21. http://dx.doi.org/10.1155/2021/6625579.
Full textEt. al., Ch Chakradhara Rao,. "Enhanced Effective and Privacy Preserving Multi Keyword Search over Encrypted Data in Cloud Storage Using Blowfish Algorithm." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (April 11, 2021): 2845–53. http://dx.doi.org/10.17762/turcomat.v12i2.2316.
Full textChen, Changsheng. "QR Code Authentication with Embedded Message Authentication Code." Mobile Networks and Applications 22, no. 3 (November 17, 2016): 383–94. http://dx.doi.org/10.1007/s11036-016-0772-y.
Full textWANG, Da-Yin. "A Parallelizable Message Authentication Code." Journal of Software 18, no. 7 (2007): 1756. http://dx.doi.org/10.1360/jos181756.
Full textJung, ChangHun, DongOh Shin, RhongHo Jang, DaeHun Nyang, KyungHee Lee, and Heung-Youl Youm. "Digital Legal Seal for Message Authentication Code." Journal of the Korea Institute of Information Security and Cryptology 26, no. 2 (April 30, 2016): 345–58. http://dx.doi.org/10.13089/jkiisc.2016.26.2.345.
Full textSon, Young-ho, Jin-keun Hong, and Keun-sung Bae. "Authentication masking code against DoS of T-MAC protocol." Journal of Central South University 20, no. 7 (July 2013): 1889–95. http://dx.doi.org/10.1007/s11771-013-1687-4.
Full textChen, Ce, Xiao Hui Jiang, Yong Hu, and Jiu Wu Guo. "Software Status Identification Based on Message Authentication Technology." Applied Mechanics and Materials 519-520 (February 2014): 343–49. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.343.
Full textFahmy, Alaa. "NEW MESSAGE AUTHENTICATION CODE USLNG UNIMODAL CHAOTIC MAPPING." International Conference on Electrical Engineering 1, no. 1 (March 1, 1998): 456–62. http://dx.doi.org/10.21608/iceeng.1998.61102.
Full textKumar, Manish, Ashish Avasthi, and Gaurav Gaurav. "Advancing the Cryptographic Hash-Based Message Authentication Code." International Journal of Engineering and Technology 3, no. 3 (2011): 269–73. http://dx.doi.org/10.7763/ijet.2011.v3.236.
Full textYeh, Yi-Shiung, Chu-Hsing Lin, and Wei-Shen Lai. "Construct message authentication code with SHA and AEA." Journal of Discrete Mathematical Sciences and Cryptography 5, no. 1 (April 2002): 77–83. http://dx.doi.org/10.1080/09720529.2002.10697940.
Full textWang, Xiuli. "A New Construction of Multisender Authentication Codes from Polynomials over Finite Fields." Journal of Applied Mathematics 2013 (2013): 1–7. http://dx.doi.org/10.1155/2013/320392.
Full textWang, Xiuli. "A New Construction of Multisender Authentication Codes from Pseudosymplectic Geometry over Finite Fields." Journal of Applied Mathematics 2013 (2013): 1–10. http://dx.doi.org/10.1155/2013/602539.
Full textRKulkarni, V., Saneet Kalmani, and Shashank Vernekar. "Secured Hash2 based Message Authentication Code using GUI Controls." International Journal of Computer Applications 76, no. 8 (August 23, 2013): 33–37. http://dx.doi.org/10.5120/13269-0772.
Full textAlimpia, Jerone B. "An Enhanced Hash-based Message Authentication Code using BCrypt." International Journal for Research in Applied Science and Engineering Technology 6, no. 4 (April 30, 2018): 1429–32. http://dx.doi.org/10.22214/ijraset.2018.4240.
Full textMousavi, Seyyed Mehdi, and Dr Mohammad Hossein Shakour. "Increasing Cryptography Security using Hash-based Message Authentication Code." International Journal of Engineering and Technology 11, no. 4 (August 31, 2019): 1046–56. http://dx.doi.org/10.21817/ijet/2019/v11i4/191104086.
Full textkumar, N. Shantha, and Dr Hareesh K. "A Primitive Proposal of an Algorithm for IP and Mac Based Data Aggregation and message authentication in Wireless Sensor Networks." International Journal of Soft Computing and Engineering 9, no. 4 (November 5, 2019): 14–17. http://dx.doi.org/10.35940/ijsce.c3322.109119.
Full textXie, Man De. "Secure Image Management Based on Deluge Protocol in Wireless Sensor Networks." Applied Mechanics and Materials 29-32 (August 2010): 2608–13. http://dx.doi.org/10.4028/www.scientific.net/amm.29-32.2608.
Full textYang, B., R. Karri, and D. A. Mcgrew. "A High-Speed Hardware Architecture for Universal Message Authentication Code." IEEE Journal on Selected Areas in Communications 24, no. 10 (October 2006): 1831–39. http://dx.doi.org/10.1109/jsac.2006.877133.
Full textHirose, Shoichi, and Junji Shikata. "Aggregate Message Authentication Code Capable of Non-Adaptive Group-Testing." IEEE Access 8 (2020): 216116–26. http://dx.doi.org/10.1109/access.2020.3041638.
Full textFahmy, Alaa. "A New Generation of Message Authentication Code Using Symbolic Dynamics." International Conference on Aerospace Sciences and Aviation Technology 8, ASAT CONFERENCE (May 1, 1999): 1–7. http://dx.doi.org/10.21608/asat.1999.25149.
Full textBellare, Mihir, Joe Kilian, and Phillip Rogaway. "The Security of the Cipher Block Chaining Message Authentication Code." Journal of Computer and System Sciences 61, no. 3 (December 2000): 362–99. http://dx.doi.org/10.1006/jcss.1999.1694.
Full textCheng, Chun Ling, Ya Shi Wang, Chun Ju Sun, Zhi Hua Zhang, and Jiang Ning Wang. "Ultra-Lightweight Authentication Protocol Based on Distribution Terminal Fingerprint." Advanced Materials Research 616-618 (December 2012): 2142–48. http://dx.doi.org/10.4028/www.scientific.net/amr.616-618.2142.
Full textZhan, Xu, Yue Rong Lei, Ling Yan Du, Hui Ming Zeng, and Jian Ling Chen. "A Grayscale Image Fragile Watermark Authentication System in Spatial-Domain." Applied Mechanics and Materials 380-384 (August 2013): 2920–24. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2920.
Full textK. Sodhi, Gurpreet, Gurjot S. Gaba, Lavish Kansal, Eduard Babulak, Mohammed AlZain, Sandeep Kumar Arora, and Mehedi Masud. "Preserving Authenticity and Integrity of Distributed Networks through Novel Message Authentication Code." Indonesian Journal of Electrical Engineering and Computer Science 12, no. 3 (December 1, 2018): 1297. http://dx.doi.org/10.11591/ijeecs.v12.i3.pp1297-1304.
Full textAkhter, A. F. M. Suaib, Mohiuddin Ahmed, A. F. M. Shahen Shah, Adnan Anwar, and Ahmet Zengin. "A Secured Privacy-Preserving Multi-Level Blockchain Framework for Cluster Based VANET." Sustainability 13, no. 1 (January 4, 2021): 400. http://dx.doi.org/10.3390/su13010400.
Full textAl-Alak, Saif, Zuriati Zukranian, Azizol Abdullah, and Shamala Subramiam. "Authentication Time of IEEE 802.15.4 with Multiple-key Protocol Using Distributed Message Authentication Code Algorithm." Research Journal of Information Technology 4, no. 4 (April 1, 2012): 140–54. http://dx.doi.org/10.3923/rjit.2012.140.154.
Full textKim, Minwoo, and Taekyoung Kwon. "Analysis of Research Trend and Performance Comparison on Message Authentication Code." Journal of KIISE 43, no. 11 (November 15, 2016): 1245–58. http://dx.doi.org/10.5626/jok.2016.43.11.1245.
Full textUttarwar, Shreya V., and Dr Bagade A. M. "Two-Level QR Code for Secured Message Sharing and Document Authentication." IJARCCE 6, no. 6 (June 30, 2017): 508–11. http://dx.doi.org/10.17148/ijarcce.2017.6689.
Full text