2019 International Conference on Cyber Security and Internet of Things (ICSIoT) 2019
DOI: 10.1109/icsiot47925.2019.00008
|View full text |Cite
|
Sign up to set email alerts
|

A Cryptographic Technique for Authentication and Validation of Forensic Account Audit Using SHA256

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 3 publications
0
2
0
Order By: Relevance
“…A number of works are devoted to limiting access to confidential information using hashing, which can be used during file analysis. The use of a cryptographic scheme to ensure the addition of only authorized and valid records to an existing block of records marked with time stamps is proposed in [17]. This was achieved by applying blockchain technology using the SHA256 hashing algorithm to hash accounts, thus protecting sample records that cannot be easily altered.…”
Section: Attempts To Normalize Text Documents In Particular Technical...mentioning
confidence: 99%
“…A number of works are devoted to limiting access to confidential information using hashing, which can be used during file analysis. The use of a cryptographic scheme to ensure the addition of only authorized and valid records to an existing block of records marked with time stamps is proposed in [17]. This was achieved by applying blockchain technology using the SHA256 hashing algorithm to hash accounts, thus protecting sample records that cannot be easily altered.…”
Section: Attempts To Normalize Text Documents In Particular Technical...mentioning
confidence: 99%
“…As for the blockchain implementation, it made use of the facilities that Java security libraries can offer in terms of SHA-256 hash functionalities [66] for the implementation works. This was of mandatory usage because blockchain relies heavily on the idea of hash functions to link blocks of information with each other.…”
Section: Figure 12 Dds Generated Classesmentioning
confidence: 99%