TELKOMNIKA Telecommunication, Computing, Electronics and Control 
A new algorithm for implementing message authentication and integrity in software implementations
    
    
    Dublin Core
Title
TELKOMNIKA Telecommunication, Computing, Electronics and Control 
A new algorithm for implementing message authentication and integrity in software implementations
            A new algorithm for implementing message authentication and integrity in software implementations
Subject
Authentication integrity, Hash functions, Validation
            Description
IT systems and data that you store, and process are valuable resources that need protection. Validation and reliability of information are essential in networks and computer systems. The communicating is done by two parties via an unsafe channel require a way to validate the data spent by one party as valid (or unaltered) by the other party. In our study, we suggest new one-way defragmentation algorithm to implement message authentication and integration in program execution. These software applications are readily available and freely available because most of the hash functions are faster than their existing radioactive blocks. 
            Creator
Alaa Wagih Abdul Qader, Israa Ezzat Salem, Haider Rasheed Abdulshaheed
            Source
DOI: 10.12928/TELKOMNIKA.v18i5.15276
            Publisher
Universitas Ahmad Dahlan
            Date
October 2020
            Contributor
Sri Wahyuni
            Rights
ISSN: 1693-6930
            Relation
http://journal.uad.ac.id/index.php/TELKOMNIKA
            Format
PDF
            Language
English
            Type
Text
            Coverage
TELKOMNIKA Telecommunication, Computing, Electronics and Control 
            Files
Collection
Citation
Alaa Wagih Abdul Qader, Israa Ezzat Salem, Haider Rasheed Abdulshaheed, “TELKOMNIKA Telecommunication, Computing, Electronics and Control 
A new algorithm for implementing message authentication and integrity in software implementations,” Repository Horizon University Indonesia, accessed October 31, 2025, https://repository.horizon.ac.id/items/show/4083.
    A new algorithm for implementing message authentication and integrity in software implementations,” Repository Horizon University Indonesia, accessed October 31, 2025, https://repository.horizon.ac.id/items/show/4083.