Results 1 to 10 of about 71,578 (184)

Hash-Chain Fog/Edge: A Mode-Based Hash-Chain for Secured Mutual Authentication Protocol Using Zero-Knowledge Proofs in Fog/Edge [PDF]

open access: yesSensors, 2022
Authentication is essential for the prevention of various types of attacks in fog/edge computing. So, a novel mode-based hash chain for secure mutual authentication is necessary to address the Internet of Things (IoT) devices’ vulnerability, as there ...
Mayuresh Sunil Pardeshi   +2 more
doaj   +5 more sources

Hash-chain-based authentication for IoT

open access: yesAdvances in Distributed Computing and Artificial Intelligence Journal, 2016
The number of everyday interconnected devices continues to increase and constitute the Internet of Things (IoT). Things are small computers equipped with sensors and wireless communications capabilities that are driven by energy constraints, since they ...
Antonio PINTO, Ricardo COSTA
doaj   +3 more sources

Permutation-Based Hash Chains with Application to Password Hashing [PDF]

open access: yesIACR Transactions on Symmetric Cryptology
Hash chain based password systems are a useful way to guarantee authentication with one-time passwords. The core idea dates back to Lamport, and is specified in RFC 1760 as S/Key. At CCS 2017, Kogan et al.
Charlotte Lefevre, Bart Mennink
doaj   +3 more sources

Post-Quantum Linkable Hash-Based Ring Signature Scheme for Off-Chain Payments in IoT [PDF]

open access: yesSensors
Off-chain payments in the Internet of Things (IoT) enhance the efficiency and scalability of blockchain transactions. However, existing privacy mechanisms face challenges, such as the disclosure of payment channels and transaction traceability ...
Linlin He   +4 more
doaj   +2 more sources

File Data Synchronization Method Based on Ordered Hash Chain [PDF]

open access: yesJisuanji gongcheng, 2023
This study aims to tackle the problems of low efficiency and local update difficulties in the existing file data synchronization transmission methods.To this end, it proposes a Hash chain construction and file data synchronization method.It takes the ...
ZENG Chang, JIANG Wenbao, GUO Yangnan
doaj   +1 more source

Fast Counterfeit RFID Tags Detection With Slot Constraints

open access: yesIEEE Access, 2023
RFID tags are prone to counterfeit attacks in supply chain scenarios. The attacker often uses counterfeit tags to replace stolen tags to avoid being detected by the inventory process.
Bing Zhang, Xu Hu, Shan Gao
doaj   +1 more source

P/Key: PUF based second factor authentication.

open access: yesPLoS ONE, 2023
One-time password (OTP) mechanisms are widely used to strengthen authentication processes. In time-based one-time password (TOTP) mechanisms, the client and server store common secrets.
Ertan Uysal, Mete Akgün
doaj   +2 more sources

XOR Chain and Perfect Secrecy at the Dawn of the Quantum Era

open access: yesCryptography, 2023
In this article, we present a new method that achieves Shannon’s perfect secrecy. To achieve this property, we will introduce the triple XOR cancellation rule. The approach has two execution modes: digital signature and data encryption.
Luis Adrián Lizama-Pérez
doaj   +1 more source

Comparative Study and Analysis on Integrity of Data Files Using Different Tools and Techniques

open access: yesJournal of Information Security and Cybercrimes Research, 2021
Digital forensic investigation is the scientific process of collection, preservation, examination, analysis, documentation and presentation of digital evidence from digital devices, so that the evidence is in compliance with legal terms and acceptable in
Kumarshankar Raychaudhuri   +2 more
doaj   +1 more source

A Defense Scheme of Primary User Emulation Attack in Cognitive Radio [PDF]

open access: yesJisuanji gongcheng, 2016
In order to avoid the adverse effects of the Primary User Emulation Attack(PUEA) in Cognitive Radio(CR) network,an authentication scheme based on Hash chain is proposed.Two occasions are considered in this scheme,one is PUEA between primary users and ...
MA Shenghong,LONG Min
doaj   +1 more source

Home - About - Disclaimer - Privacy