Results 1 to 10 of about 72,112 (197)

Hash-Chain Fog/Edge: A Mode-Based Hash-Chain for Secured Mutual Authentication Protocol Using Zero-Knowledge Proofs in Fog/Edge [PDF]

open access: yesSensors, 2022
Authentication is essential for the prevention of various types of attacks in fog/edge computing. So, a novel mode-based hash chain for secure mutual authentication is necessary to address the Internet of Things (IoT) devices’ vulnerability, as there ...
Mayuresh Sunil Pardeshi   +2 more
doaj   +5 more sources

Hash-chain-based authentication for IoT

open access: diamondAdvances in Distributed Computing and Artificial Intelligence Journal, 2016
The number of everyday interconnected devices continues to increase and constitute the Internet of Things (IoT). Things are small computers equipped with sensors and wireless communications capabilities that are driven by energy constraints, since they ...
Antonio PINTO, Ricardo COSTA
doaj   +4 more sources

Blockchain Processing Technique Based on Multiple Hash Chains for Minimizing Integrity Errors of IoT Data in Cloud Environments [PDF]

open access: goldSensors, 2021
As IoT (Internet of Things) devices are diversified in the fields of use (manufacturing, health, medical, energy, home, automobile, transportation, etc.), it is becoming important to analyze and process data sent and received from IoT devices connected ...
Yoon-Su Jeong
doaj   +2 more sources

Separate Chaining Meets Compact Hashing [PDF]

open access: green, 2019
Preprint of the local proceedings of the 173th SIGAL ...
Dominik Köppl
openaire   +3 more sources

DeCoTa: a lightweight decentralized cross-chain transfer scheme based on hash-locking [PDF]

open access: goldScientific Reports
With the wide application of blockchain comes the challenge of cross-chain interaction. For example, the isolation between the information stored in different blockchains can result in the ”isolated islands of value” effect in blockchains.
Huiying Zou   +4 more
doaj   +2 more sources

Hasq Hash Chains [PDF]

open access: green, 2014
This paper describes a particular hash-based records linking chain scheme. This scheme is simple conceptually and easy to implement in software. It allows for a simple and secure way to transfer ownership of digital objects between peers.
Mazonka, Oleg, Popov, Vlad
openaire   +3 more sources

Individual Displacements in Hashing with Coalesced Chains [PDF]

open access: greenCombinatorics, Probability and Computing, 2008
We study the asymptotic distribution of the displacements in hashing with coalesced chains, for both late-insertion and early-insertion. Asymptotic formulas for means and variances follow. The method uses Poissonization and some stochastic calculus.
Svante Janson
openaire   +4 more sources

A Study on the Concept of Using Efficient Lightweight Hash Chain to Improve Authentication in VMF Military Standard [PDF]

open access: goldApplied Sciences, 2020
Authentication algorithms in the form of cryptographic schemes, such as the Secure Hash Algorithm 1 (SHA-1) and the digital signature algorithm (DSA), specified in the current variable message format (VMF) military standard have numerous reliability ...
Dohoon Kim   +4 more
doaj   +2 more sources

Selective Location Blinding Using Hash Chains [PDF]

open access: green, 2011
Location-based applications require a user's movements and positions to provide customized services. However, location is a sensitive piece of information that should not be revealed unless strictly necessary. In this paper we propose a procedure that allows a user to control the precision in which his location information is exposed to a service ...
Lenzini, Gabriele   +2 more
openaire   +3 more sources

Permutation-Based Hash Chains with Application to Password Hashing [PDF]

open access: yesIACR Transactions on Symmetric Cryptology
Hash chain based password systems are a useful way to guarantee authentication with one-time passwords. The core idea dates back to Lamport, and is specified in RFC 1760 as S/Key. At CCS 2017, Kogan et al.
Charlotte Lefevre, Bart Mennink
doaj   +3 more sources

Home - About - Disclaimer - Privacy