Results 1 to 10 of about 2,393,536 (254)

Hash-Chain Fog/Edge: A Mode-Based Hash-Chain for Secured Mutual Authentication Protocol Using Zero-Knowledge Proofs in Fog/Edge [PDF]

open access: goldSensors, 2022
Authentication is essential for the prevention of various types of attacks in fog/edge computing. So, a novel mode-based hash chain for secure mutual authentication is necessary to address the Internet of Things (IoT) devices’ vulnerability, as there ...
Mayuresh Sunil Pardeshi   +2 more
doaj   +5 more sources

A Secure Communication Method Based on Message Hash Chain [PDF]

open access: goldApplied Sciences, 2022
Traditional network communication methods lack endogenous security mechanisms, which is the root cause of network security problems, e.g., spoofing identity and address forgery.
Mingxuan Han, Wenbao Jiang
doaj   +3 more sources

Comparative Experiments of V2X Security Protocol Based on Hash Chain Cryptography. [PDF]

open access: goldSensors (Basel), 2020
Vehicle-to-everything (V2X) is the communication technology designed to support road safety for drivers and autonomous driving. The light-weight security solution is crucial to meet the real-time needs of on-board V2X applications.
Hakeem SAA, El-Gawad MAA, Kim H.
europepmc   +4 more sources

A Study on the Concept of Using Efficient Lightweight Hash Chain to Improve Authentication in VMF Military Standard [PDF]

open access: goldApplied Sciences, 2020
Authentication algorithms in the form of cryptographic schemes, such as the Secure Hash Algorithm 1 (SHA-1) and the digital signature algorithm (DSA), specified in the current variable message format (VMF) military standard have numerous reliability ...
Dohoon Kim   +4 more
doaj   +3 more sources

Research on trusted DNP3-BAE protocol based on hash chain [PDF]

open access: goldEURASIP Journal on Wireless Communications and Networking, 2018
To solve the security problem of industrial Ethernet DNP3 protocol broadcast authentication, the attack vector and security requirements of trusted DNP3 protocol are analysed.
Ye Lu, Tao Feng
doaj   +3 more sources

Hash-chain-based authentication for IoT

open access: diamondAdvances in Distributed Computing and Artificial Intelligence Journal, 2016
The number of everyday interconnected devices continues to increase and constitute the Internet of Things (IoT). Things are small computers equipped with sensors and wireless communications capabilities that are driven by energy constraints, since they ...
Antonio PINTO, Ricardo COSTA
doaj   +4 more sources

Improved One-Way Hash Chain and Revocation Polynomial-Based Self-Healing Group Key Distribution Schemes in Resource-Constrained Wireless Networks [PDF]

open access: yesSensors, 2014
Self-healing group key distribution (SGKD) aims to deal with the key distribution problem over an unreliable wireless network. In this paper, we investigate the SGKD issue in resource-constrained wireless networks.
Huifang Chen, Lei Xie
doaj   +3 more sources

A Key Management Protocol Based on the Hash Chain Key Generation for Securing LoRaWAN Networks. [PDF]

open access: yesSensors (Basel), 2021
Recently, many Low Power Wide Area Network (LPWAN) protocols have been proposed for securing resource-constrained Internet of Things (IoT) devices with negligible power consumption.
Hakeem SAA, El-Kader SMA, Kim H.
europepmc   +2 more sources

Hash-Chain-Based Cross-Regional Safety Authentication for Space-Air-Ground Integrated VANETs

open access: yesApplied Sciences, 2020
With the increasing demand for intelligent traffic management and road network intelligent information services, the vehicular ad hoc networks (VANETs) combined with information of air, space and ground have outstanding advantages in coverage, reliable ...
Gege Luo   +3 more
doaj   +2 more sources

Hey, That's My Model! Introducing Chain & Hash, An LLM Fingerprinting Technique [PDF]

open access: greenarXiv.org
Growing concerns over the theft and misuse of Large Language Models (LLMs) have heightened the need for effective fingerprinting, which links a model to its original version to detect misuse.
M. Russinovich, Ahmed Salem
semanticscholar   +2 more sources

Home - About - Disclaimer - Privacy