Hash-Chain Fog/Edge: A Mode-Based Hash-Chain for Secured Mutual Authentication Protocol Using Zero-Knowledge Proofs in Fog/Edge [PDF]
Authentication is essential for the prevention of various types of attacks in fog/edge computing. So, a novel mode-based hash chain for secure mutual authentication is necessary to address the Internet of Things (IoT) devices’ vulnerability, as there ...
Mayuresh Sunil Pardeshi+2 more
doaj +3 more sources
Improved One-Way Hash Chain and Revocation Polynomial-Based Self-Healing Group Key Distribution Schemes in Resource-Constrained Wireless Networks [PDF]
Self-healing group key distribution (SGKD) aims to deal with the key distribution problem over an unreliable wireless network. In this paper, we investigate the SGKD issue in resource-constrained wireless networks.
Huifang Chen, Lei Xie
doaj +5 more sources
Hash-Chain-Based Cross-Regional Safety Authentication for Space-Air-Ground Integrated VANETs [PDF]
With the increasing demand for intelligent traffic management and road network intelligent information services, the vehicular ad hoc networks (VANETs) combined with information of air, space and ground have outstanding advantages in coverage, reliable ...
Gege Luo+3 more
doaj +3 more sources
A Key Management Protocol Based on the Hash Chain Key Generation for Securing LoRaWAN Networks [PDF]
Recently, many Low Power Wide Area Network (LPWAN) protocols have been proposed for securing resource-constrained Internet of Things (IoT) devices with negligible power consumption.
Shimaa A. Abdel Hakeem+2 more
doaj +3 more sources
Comparative Experiments of V2X Security Protocol Based on Hash Chain Cryptography [PDF]
Vehicle-to-everything (V2X) is the communication technology designed to support road safety for drivers and autonomous driving. The light-weight security solution is crucial to meet the real-time needs of on-board V2X applications.
Shimaa A. Abdel Hakeem+2 more
doaj +3 more sources
DeCoTa: a lightweight decentralized cross-chain transfer scheme based on hash-locking [PDF]
With the wide application of blockchain comes the challenge of cross-chain interaction. For example, the isolation between the information stored in different blockchains can result in the ”isolated islands of value” effect in blockchains.
Huiying Zou+4 more
doaj +3 more sources
Hey, That's My Model! Introducing Chain & Hash, An LLM Fingerprinting Technique [PDF]
Amid growing concerns over the ease of theft and misuse of Large Language Models (LLMs), the need for fingerprinting models has increased. Fingerprinting, in this context, means that the model owner can link a given model to their original version, thereby identifying if their model is being misused or has been completely stolen.
Mark Russinovich, Ahmed Salem
arxiv +4 more sources
A Secure Communication Method Based on Message Hash Chain
Traditional network communication methods lack endogenous security mechanisms, which is the root cause of network security problems, e.g., spoofing identity and address forgery.
Mingxuan Han, Wenbao Jiang
doaj +2 more sources
A Survey of RFID Authentication Protocols Based on Hash-Chain Method [PDF]
Security and privacy are the inherent problems in RFID communications. There are several protocols have been proposed to overcome those problems. Hash chain is commonly employed by the protocols to improve security and privacy for RFID authentication ...
Chang, Elizabeth+3 more
core +4 more sources
Separate Chaining Meets Compact Hashing [PDF]
While separate chaining is a common strategy for resolving collisions in a hash table taught in most textbooks, compact hashing is a less common technique for saving space when hashing integers whose domain is relatively small with respect to the problem size.
Dominik Köppl
arxiv +3 more sources