Results 1 to 10 of about 7,246 (153)

Hash-Chain Fog/Edge: A Mode-Based Hash-Chain for Secured Mutual Authentication Protocol Using Zero-Knowledge Proofs in Fog/Edge [PDF]

open access: goldSensors, 2022
Authentication is essential for the prevention of various types of attacks in fog/edge computing. So, a novel mode-based hash chain for secure mutual authentication is necessary to address the Internet of Things (IoT) devices’ vulnerability, as there ...
Mayuresh Sunil Pardeshi   +2 more
doaj   +4 more sources

A Secure Communication Method Based on Message Hash Chain [PDF]

open access: goldApplied Sciences, 2022
Traditional network communication methods lack endogenous security mechanisms, which is the root cause of network security problems, e.g., spoofing identity and address forgery.
Mingxuan Han, Wenbao Jiang
doaj   +2 more sources

A Study on the Concept of Using Efficient Lightweight Hash Chain to Improve Authentication in VMF Military Standard [PDF]

open access: goldApplied Sciences, 2020
Authentication algorithms in the form of cryptographic schemes, such as the Secure Hash Algorithm 1 (SHA-1) and the digital signature algorithm (DSA), specified in the current variable message format (VMF) military standard have numerous reliability ...
Dohoon Kim   +4 more
doaj   +2 more sources

Reversible and Plausibly Deniable Covert Channels in One-Time Passwords Based on Hash Chains [PDF]

open access: goldApplied Sciences, 2021
Covert channels enable stealthy communications over innocent appearing carriers. They are increasingly applied in the network context. However, little work is available that exploits cryptographic primitives in the networking context to establish such ...
Jörg Keller, Steffen Wendzel
doaj   +2 more sources

DeCoTa: a lightweight decentralized cross-chain transfer scheme based on hash-locking [PDF]

open access: yesScientific Reports
With the wide application of blockchain comes the challenge of cross-chain interaction. For example, the isolation between the information stored in different blockchains can result in the ”isolated islands of value” effect in blockchains.
Huiying Zou   +4 more
doaj   +2 more sources

Post-Quantum Linkable Hash-Based Ring Signature Scheme for Off-Chain Payments in IoT [PDF]

open access: yesSensors
Off-chain payments in the Internet of Things (IoT) enhance the efficiency and scalability of blockchain transactions. However, existing privacy mechanisms face challenges, such as the disclosure of payment channels and transaction traceability ...
Linlin He   +4 more
doaj   +2 more sources

An Ordered Universal Accumulator Based on a Hash Chain [PDF]

open access: goldApplied Sciences
Cryptographic accumulators are now fundamental for secure applications across blockchain, IoT, and big data, powering anonymous credentials, streamlining key management, and enabling efficient data filtering.
Wenbao Jiang   +3 more
doaj   +2 more sources

Hash-chain-based authentication for IoT

open access: diamondAdvances in Distributed Computing and Artificial Intelligence Journal, 2016
The number of everyday interconnected devices continues to increase and constitute the Internet of Things (IoT). Things are small computers equipped with sensors and wireless communications capabilities that are driven by energy constraints, since they ...
Antonio PINTO, Ricardo COSTA
doaj   +3 more sources

Improved One-Way Hash Chain and Revocation Polynomial-Based Self-Healing Group Key Distribution Schemes in Resource-Constrained Wireless Networks [PDF]

open access: yesSensors, 2014
Self-healing group key distribution (SGKD) aims to deal with the key distribution problem over an unreliable wireless network. In this paper, we investigate the SGKD issue in resource-constrained wireless networks.
Huifang Chen, Lei Xie
doaj   +2 more sources

Home - About - Disclaimer - Privacy