Hash-Chain-Based Cross-Regional Safety Authentication for Space-Air-Ground Integrated VANETs [PDF]
Applied Sciences, 2020With the increasing demand for intelligent traffic management and road network intelligent information services, the vehicular ad hoc networks (VANETs) combined with information of air, space and ground have outstanding advantages in coverage, reliable ...
Gege Luo+3 more
doaj +3 more sources
Hash-Chain Fog/Edge: A Mode-Based Hash-Chain for Secured Mutual Authentication Protocol Using Zero-Knowledge Proofs in Fog/Edge [PDF]
Sensors, 2022Authentication is essential for the prevention of various types of attacks in fog/edge computing. So, a novel mode-based hash chain for secure mutual authentication is necessary to address the Internet of Things (IoT) devices’ vulnerability, as there ...
Mayuresh Sunil Pardeshi+2 more
doaj +4 more sources
Individual displacements in hashing with coalesced chains [PDF]
arXiv, 2005We study the asymptotic distribution of the displacements in hashing with coalesced chains, for both late-insertion and early-insertion. Asymptotic formulas for means and variances follow. The method uses Poissonization and some stochastic calculus.
Svante Janson
arxiv +7 more sources
A Secure Communication Method Based on Message Hash Chain
Applied Sciences, 2022Traditional network communication methods lack endogenous security mechanisms, which is the root cause of network security problems, e.g., spoofing identity and address forgery.
Mingxuan Han, Wenbao Jiang
doaj +3 more sources
Data-Tracking in Blockchain Utilizing Hash Chain: A Study of Structured and Adaptive Process [PDF]
SymmetryThis study presents a series of structured and adaptive processes aimed at tracking and verifying transactions recorded on the blockchain. Permissioned blockchains are employed across diverse enterprises for various purposes, including data recording ...
Sungbeen Kim, Dohoon Kim
doaj +3 more sources
Separate Chaining Meets Compact Hashing [PDF]
arXiv, 2019While separate chaining is a common strategy for resolving collisions in a hash table taught in most textbooks, compact hashing is a less common technique for saving space when hashing integers whose domain is relatively small with respect to the problem size.
Dominik Köppl
arxiv +5 more sources
Hey, That's My Model! Introducing Chain & Hash, An LLM Fingerprinting Technique [PDF]
arXivAmid growing concerns over the ease of theft and misuse of Large Language Models (LLMs), the need for fingerprinting models has increased. Fingerprinting, in this context, means that the model owner can link a given model to their original version, thereby identifying if their model is being misused or has been completely stolen.
Mark Russinovich, Ahmed Salem
arxiv +4 more sources
Hash-chain-based authentication for IoT
Advances in Distributed Computing and Artificial Intelligence Journal, 2016The number of everyday interconnected devices continues to increase and constitute the Internet of Things (IoT). Things are small computers equipped with sensors and wireless communications capabilities that are driven by energy constraints, since they ...
Antonio PINTO, Ricardo COSTA
doaj +5 more sources
Improved One-Way Hash Chain and Revocation Polynomial-Based Self-Healing Group Key Distribution Schemes in Resource-Constrained Wireless Networks [PDF]
Sensors, 2014Self-healing group key distribution (SGKD) aims to deal with the key distribution problem over an unreliable wireless network. In this paper, we investigate the SGKD issue in resource-constrained wireless networks.
Huifang Chen, Lei Xie
doaj +3 more sources
Research on trusted DNP3-BAE protocol based on hash chain [PDF]
EURASIP Journal on Wireless Communications and Networking, 2018To solve the security problem of industrial Ethernet DNP3 protocol broadcast authentication, the attack vector and security requirements of trusted DNP3 protocol are analysed.
Ye Lu, Tao Feng
doaj +3 more sources