ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
Submitted before 1st, April 2023
Submitted after 1st, April 2023
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Search for: Data integrity
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Submitted before 1st, April 2023
Submitted after 1st, April 2023
Instructions to Reviewers
Review Paper
Statistics
A Novel Secure Hash Algorithm for Public Key Digital Signature Schemes
Abstract: Hash functions are the most widespread among all cr yptographic primitives, and are currently used in multiple
#Data integrity
# hash algorithm
# digital signature
# pre(image
# message digest
# message authentication
Testing and Evaluation of a Secure Integrity Measurement System (SIMS) for Remote Systems
integrity for flexible and traditional remote syste ms. SIMS is not only targeted for Linux, but it can also be used for different
# Data integrity
# tampering
# remote systems
# trustwor thiness
# survivability
Security-aware CoAP Application Layer Protocol for the Internet of Things using Elliptic-Curve
University, Jordan 3Department of Information Technology, Al-Balqa Applied University, Jordan
#IoT
# CoAP
# ECC
#energy saving
# security
# IoT
A Novel Secure Hash Algorithm for Public Key Digital Signature Schemes
Abstract: Hash functions are the most widespread among all cr yptographic primitives, and are currently used in multiple
#Data integrity
# hash algorithm
# digital signature
# pre(image
# message digest
# message authentication
Testing and Evaluation of a Secure Integrity Measurement System (SIMS) for Remote Systems
integrity for flexible and traditional remote syste ms. SIMS is not only targeted for Linux, but it can also be used for different
# Data integrity
# tampering
# remote systems
# trustwor thiness
# survivability
A New Digital Signature Algorithm for Ensuring the Data Integrity in Cloud using Elliptic Curves
Balasubramanian Prabhu Kavin,Sannasi Ganapathy
#Cloud
#digital signature
#enhanced digital signature
#elliptic curve
#signing process
#verification process and comparison
Networking Data Integrity: High Speed Architectures and Hardware Implementations
Nicolas Sklavos,Epaminondas Alexopoulos,Odysseas Koufopavlou
#MD5
#SHA-1
#hash functions
#hardware implementation
#cryptography
#wireless protocols security
All Rights reserved to IAJIT 2024
Powered by:
TurnPoint