2022
DOI: 10.1007/s11227-022-04714-x
|View full text |Cite
|
Sign up to set email alerts
|

HMAC-R: Hash-based message authentication code and Rijndael-based multilevel security model for data storage in cloud environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 29 publications
0
1
0
Order By: Relevance
“…This code is attached to the message or transmitted alongside it. HMAC's strength comes in its resistance to One of HMAC's primary advantages is its versatility and application across multiple security protocols and systems [20]. It's extensively applied in internet security protocols like transport layer security (TLS) and internet protocol security (IPsec), where maintaining message authenticity and integrity is crucial.…”
Section: Hmacmentioning
confidence: 99%
“…This code is attached to the message or transmitted alongside it. HMAC's strength comes in its resistance to One of HMAC's primary advantages is its versatility and application across multiple security protocols and systems [20]. It's extensively applied in internet security protocols like transport layer security (TLS) and internet protocol security (IPsec), where maintaining message authenticity and integrity is crucial.…”
Section: Hmacmentioning
confidence: 99%
“…Stage 3-Message verification: Once the encryption keys have been generated, the NeoStarling system moves to the message verification phase. Here, the authenticity and integrity of the incoming messages are verified [29]. This verification process helps detect and mitigate potential data breaches, thus ensuring the reliability of communicated data.…”
Section: General Overview Of the Neostarling Systemmentioning
confidence: 99%