1,198 Hits in 6.6 sec

QR Code Integrity Verification Based on Modified SHA-1 Algorithm

Rogel Ladia Quilala, Ariel M Sison, Ruji P Medina
2018 Indonesian Journal of Electrical Engineering and Informatics (IJEEI)  
The modified SHA-1 algorithm was applied in the data integrity verification process of certificates with QR code technology.  ...  This paper identified the requirements needed in the certificate verification that uses the modified SHA-1. The application was tested using legitimate and fraudulent certificates.  ...  Secure Hash Algorithm 1 (SHA-1) is a cryptographic hash function that produces a 160-bit hash value [21] , [22] .  ... 
doi:10.11591/ijeei.v6i4.494 fatcat:ajcprewsmrbbzhyfzot7ddiy3a

SHAvisual: A Visualization Tool for the Secure Hash Algorithm

Ching-Kuang Shene, Chaoli Wang, Jun Tao, Melissa Keranen, Jun Ma, Jean Mayo
2015 ASEE Annual Conference and Exposition Proceedings   unpublished
Visualization tools can be an effective way for educators to battle this challenge. This paper describes a tool, SHAvisual, which addresses this issue for the secure hash algorithm (SHA).  ...  Major findings of this survey include the following: (1) students indicated SHAvisual helped them understand SHA better; (2) both the Demo Mode and Practice Mode had positive impact on student learning  ...  Acknowledgments The authors are supported by the National Science Foundation under grants DUE-1140512, DUE-1245310 and IIS-1456763.  ... 
doi:10.18260/p.24708 fatcat:d2s6nuxeznhfhgwkvnc3elzuue

A Study on the Use of Checksums for Integrity Verification of Web Downloads

Alexandre Meylan, Mauro Cherubini, Bertil Chapuis, Mathias Humbert, Igor Bilogrevic, Kévin Huguenin
2020 ACM Transactions on Privacy and Security  
Developers can also make their programs available for download on their websites and host the program files either directly on their website or on third-party platforms, such as mirrors.  ...  One way to accomplish this is to check that the published file's integrity verification code-the checksum-matches that (if provided) of the downloaded file.  ...  The authors also warmly thank Holly Cogliati for her great editing job on the manuscript.  ... 
doi:10.1145/3410154 fatcat:ztayvw25vvgstfauia7xpqiigq

An advisor for web services security policies

Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon, Greg O'Shea
2005 Proceedings of the 2005 workshop on Secure web services - SWS '05  
We describe the design of an advisor for web services security configurations, the first tool both to identify such vulnerabilities automatically and to offer remedial advice.  ...  We report on its implementation as a plugin for Microsoft Web Services Enhancements (WSE).  ...  Vittorio Bertocci provided invaluable feedback on an early version of the tool.  ... 
doi:10.1145/1103022.1103024 dblp:conf/sws/BhargavanFGO05 fatcat:aqibmj3vnna7xmrn5oluwki3ne

Design and Performance Evaluation of the Secure Transmission Module for Three-dimensional Medical Image System based on Web PACS
3차원 의료영상시스템을 위한 웹 PACS 기반 보안전송모듈의 설계 및 성능평가

Jungchae Kim, Sun Kook Yoo
2013 Journal of the Institute of Electronics and Information Engineers  
At that time, combinations of the algorithm was 'DES-MD5', 'DES-SHA1', '3DES-MD5', and '3DES-SHA1, and the experiment was performed on our test-bed.  ...  Thus, if the secure transmission system adopted to the medical images that should be protected, it could solve server performance gradation and compose secure web PACS.  ...  PACS The service scenario for secure web PACS. 이 때, IPSec 협상을 통하여 인증 받지 못한 클라이언 트가 송신하는 패킷은 네트워크 계층에서 폐기한다.  ... 
doi:10.5573/ieek.2013.50.3.179 fatcat:s2g3fhhgznc7va7t3ucbrespva

Tracking Phishing Attacks Over Time

Qian Cui, Guy-Vincent Jourdan, Gregor V. Bochmann, Russell Couturier, Iosif-Viorel Onut
2017 Proceedings of the 26th International Conference on World Wide Web - WWW '17  
Combatting phishing is thus a top-priority, and has been the focus of much work, both on the academic and on the industry sides. In this paper, we look at this problem from a new angle.  ...  The so-called "phishing" attacks are one of the important threats to individuals and corporations in today's Internet.  ...  Acknowledgements This work is supported by the IBM R Center for Advanced Studies and the Natural Sciences and Engineering Research Council of Canada (NSERC).  ... 
doi:10.1145/3038912.3052654 dblp:conf/www/CuiJBCO17 fatcat:5vwxx4fhzvdvdo5n6eyixw5opy

Hardening Web browsers against man-in-the-middle and eavesdropping attacks

Xia Brustoloni, José Carlos Brustoloni
2005 Proceedings of the 14th international conference on World Wide Web - WWW '05  
Existing Web browsers handle security errors in a manner that often confuses users.  ...  Our results suggest that CSCV and SPW can greatly improve Web browsing security and are easy to use even without training. Moreover, CSCV had greater impact than did staged security training.  ...  We thank the anonymous referees for their valuable comments, and Elaine Rubinstein for her help in the statistical analysis of our results.  ... 
doi:10.1145/1060745.1060817 dblp:conf/www/BrustoloniB05 fatcat:2z2gxjjmcnggbhymagggwc4tyi

Towards Usable Checksums

Mauro Cherubini, Alexandre Meylan, Bertil Chapuis, Mathias Humbert, Igor Bilogrevic, Kévin Huguenin
2018 Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security - CCS '18  
CCS CONCEPTS • Security and privacy → Web protocol security; Usability in security and privacy; Hash functions and message authentication codes;  ...  the one they obtain from the downloaded file.  ...  The authors also warmly thank Holly Cogliati for her great editing job on the manuscript. The work was partially funded with a UNIL-HEC Lausanne Research Fund.  ... 
doi:10.1145/3243734.3243746 dblp:conf/ccs/CherubiniMCHBH18 fatcat:sjoof57nujc27ozrhjaufdnbva


Sören Auer, Sebastian Dietzold, Jens Lehmann, Sebastian Hellmann, David Aumueller
2009 Proceedings of the 18th international conference on World wide web - WWW '09  
Triplify transforms the resulting relations into RDF statements and publishes the data on the Web in various RDF serializations, in particular as Linked Data.  ...  The rationale for developing Triplify is that the largest part of information on the Web is already stored in structured form, often as data contained in relational databases, but usually published by  ...  We thank the members of the W3C RDB2RDF XG for numerous discussions -in particular Satya Sahoo and Wolfgang Halb for editing the literature survey, providing valuable input for the related work section  ... 
doi:10.1145/1526709.1526793 dblp:conf/www/AuerDLHA09 fatcat:ewam4b47tvcwxiaz4krg2ut7vi

Low Power and Simple Implementation of Secure Hashing Algorithm (SHA-2) using VHDL Implemented on FPGA of SHA-224/256 Core

Dipti Thakur, Prof. Utsav Malviya
2018 Zenodo  
Hashing algorithm like Secure Hash Algorithm-2 (SHA-2(224/256)) is designed which has a fixed output length of 512-bits.  ...  Hashing algorithms are used to create these digital signatures for verification of the data received.  ...  Like SHA-1, SHA-2 is also a one-way and collision-resistant cryptographic hash function with variable digest length [1] and used in cryptographic primitives for security applications and protocols such  ... 
doi:10.5281/zenodo.3362710 fatcat:ebtll7udhzap3bp77n5kb27xpe

Engineering Graphical Captcha and AES Crypto Hash Functions for Secure Online Authentication

Nafisah Kheshaifaty, Computer Engineering Department, Umm Al-Qura University, Makkah, Saudi Arabia, Adnan Gutub, Computer Engineering Department, Umm Al-Qura University, Makkah, Saudi Arabia
2021 Maǧallaẗ al-abḥāṯ al-handasiyyaẗ  
The CAPTCHA has several applications in the online security domain requiring to be merged with encrypted hash function benefitting from the facility of the graphical password schemes.  ...  This paper proposes engineering an authentication technique using graphical CAPTCHA with an AES encrypted hash password to maintain applicable security accessing systems.  ...  The applications of hash functions are popular to be considered in the hash table structure found appropriate utilizing SHA 256, as secure functions improving SHA-1 (Zhang et al., 2019) .  ... 
doi:10.36909/jer.13761 fatcat:xhqxzuh225hkpoalcz2cqcydju

Preventing Phishing Attacks: A Novel Approach

Tushar Goyal, Alay Vakil, Dhrumil Parmar, Rishit Jain, Devesh C. Jinwala
2015 International Journal of Computer Applications  
However, we observe that there is a need for an approach that involves both the client and server, and integrates security with the primary task of the user.  ...  With increasing reliance of people on internet based transactions, phishing attacks have also become more sophisticated and have caused large-scale material and trust losses.  ...  In 2005, cryptanalysts found attacks on SHA-1 suggesting that the algorithm might not be secure enough for on-going use [15] .  ... 
doi:10.5120/21606-4521 fatcat:wwhauibtffeydfrhc5pi3blcdy

A Secure Score Report Implemented in a Spreadsheet without Privacy Concerns

Dongchang Yoo, Minyoung Bae, Yongjin Yeom
2016 International Journal of Security and Its Applications  
Also, it is cryptographically as secure as underlying hash function SHA-256.  ...  Based on our worksheet as a template, it is easy for instructors to write their own score reports without relying on any heavy management systems.  ...  Secure Hash Algorithm SHA-256 in an Excel Worksheet Secure Hash Algorithm SHA-256 A cryptographic hash function is an algorithm which transforms an input message of any length into the output of fixed  ... 
doi:10.14257/ijsia.2016.10.3.13 fatcat:37i57shpi5cahihqeppa2sn5ye

Hash-chain-based authentication for IoT

Antonio PINTO, Ricardo COSTA
2016 Advances in Distributed Computing and Artificial Intelligence Journal  
The collected data is stored on-line using web-services that, sometimes, operate without any special considerations regarding security and privacy.  ...  The current work proposes a modified hash-chain authentication mechanism that, with the help of a smartphone, can authenticate each interaction of the devices with a REST web-service using One Time Passwords  ...  SHA-256 and SHA-512 where the selected secure hash algorithms, from the list of the algorithms available in the Java language, mainly because the remaining ones are currently considered insecure by multiple  ... 
doi:10.14201/adcaij2016544357 fatcat:fqph4ay2ofa6xpf7f2p5xnaava

Identification of Fake Video Using Smart Contracts and SHA Algorithm [chapter]

SwapnaliTambe, Anil Pawar, S K Yadav
2021 Advances in Parallel Computing  
We utilize a few calculations to relieve the issue, for example, the SHA string  ...  In our proposed framework, we centre around identifying profound phony recordings utilizing blockchains, keen agreements, and secure hashing calculations.  ...  FIPS [03], this article explains the Secure Hash Signature standard, four secure hash computations are shown in this standard: SHA-1, SHA-256, SHA-384 and SHA-512, to enlist a thick depiction of electronic  ... 
doi:10.3233/apc210227 fatcat:gcbdeej7dve4zekikkt2d7xsyu
« Previous Showing results 1 — 15 out of 1,198 results