Chrome Extension
WeChat Mini Program
Use on ChatGLM

System Analysis and Example of Using SHA-512 Hash Functions to Protect Students' Personal Data on Educational Platforms

2021 IEEE 16th International Conference on Computer Sciences and Information Technologies (CSIT)(2021)

Cited 1|Views0
No score
Abstract
In modern conditions the use of hash functions for the protection of personal data plays an applied and fundamental role in the creation of educational environments on computing systems using cryptographic methods. To effectively solve this topical problem, the protection functions simultaneously pass the data of limited length to the consumer, which leads to the reduction and fixation of the size...
More
Translated text
Key words
Hash functions,Learning systems,Conferences,Software algorithms,Throughput,Software,Hardware
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined