Results 1 to 10 of about 71,578 (184)
Hash-Chain Fog/Edge: A Mode-Based Hash-Chain for Secured Mutual Authentication Protocol Using Zero-Knowledge Proofs in Fog/Edge [PDF]
Authentication is essential for the prevention of various types of attacks in fog/edge computing. So, a novel mode-based hash chain for secure mutual authentication is necessary to address the Internet of Things (IoT) devices’ vulnerability, as there ...
Mayuresh Sunil Pardeshi +2 more
doaj +5 more sources
Hash-chain-based authentication for IoT
The number of everyday interconnected devices continues to increase and constitute the Internet of Things (IoT). Things are small computers equipped with sensors and wireless communications capabilities that are driven by energy constraints, since they ...
Antonio PINTO, Ricardo COSTA
doaj +3 more sources
Permutation-Based Hash Chains with Application to Password Hashing [PDF]
Hash chain based password systems are a useful way to guarantee authentication with one-time passwords. The core idea dates back to Lamport, and is specified in RFC 1760 as S/Key. At CCS 2017, Kogan et al.
Charlotte Lefevre, Bart Mennink
doaj +3 more sources
Post-Quantum Linkable Hash-Based Ring Signature Scheme for Off-Chain Payments in IoT [PDF]
Off-chain payments in the Internet of Things (IoT) enhance the efficiency and scalability of blockchain transactions. However, existing privacy mechanisms face challenges, such as the disclosure of payment channels and transaction traceability ...
Linlin He +4 more
doaj +2 more sources
File Data Synchronization Method Based on Ordered Hash Chain [PDF]
This study aims to tackle the problems of low efficiency and local update difficulties in the existing file data synchronization transmission methods.To this end, it proposes a Hash chain construction and file data synchronization method.It takes the ...
ZENG Chang, JIANG Wenbao, GUO Yangnan
doaj +1 more source
Fast Counterfeit RFID Tags Detection With Slot Constraints
RFID tags are prone to counterfeit attacks in supply chain scenarios. The attacker often uses counterfeit tags to replace stolen tags to avoid being detected by the inventory process.
Bing Zhang, Xu Hu, Shan Gao
doaj +1 more source
P/Key: PUF based second factor authentication.
One-time password (OTP) mechanisms are widely used to strengthen authentication processes. In time-based one-time password (TOTP) mechanisms, the client and server store common secrets.
Ertan Uysal, Mete Akgün
doaj +2 more sources
XOR Chain and Perfect Secrecy at the Dawn of the Quantum Era
In this article, we present a new method that achieves Shannon’s perfect secrecy. To achieve this property, we will introduce the triple XOR cancellation rule. The approach has two execution modes: digital signature and data encryption.
Luis Adrián Lizama-Pérez
doaj +1 more source
Comparative Study and Analysis on Integrity of Data Files Using Different Tools and Techniques
Digital forensic investigation is the scientific process of collection, preservation, examination, analysis, documentation and presentation of digital evidence from digital devices, so that the evidence is in compliance with legal terms and acceptable in
Kumarshankar Raychaudhuri +2 more
doaj +1 more source
A Defense Scheme of Primary User Emulation Attack in Cognitive Radio [PDF]
In order to avoid the adverse effects of the Primary User Emulation Attack(PUEA) in Cognitive Radio(CR) network,an authentication scheme based on Hash chain is proposed.Two occasions are considered in this scheme,one is PUEA between primary users and ...
MA Shenghong,LONG Min
doaj +1 more source

