A new authentication procedure for client-server applications using HMAC

V Shukla, MK Misra, A Chaturvedi - Journal of discrete …, 2021 - Taylor & Francis
Hash functions are used for data integrity and authentication but unfortunately they suffer
with man in the middle attack problem. An intruder who has command over the …

[PDF][PDF] The automation of transaction formation and private keys holding technology in the blockchain

GE Olegovic - 2020 - dspace.spbu.ru
In the final qualifying work “The automation of transaction formation and private keys holding
technology in the blockchain”, one of the problems of the complexity of the interaction of a …