Results 101 to 110 of about 7,578 (241)

A Chain Key Model Based on Message Hash Chain

open access: yes
To address the issue of key lifespan in key security, a chain key model based on a message hash chain is proposed. This model breaks away from the traditional scheme of generating random keys using random number generators, using plaintext features as a source of randomness, and generates the next key in conjunction with the current key, achieving key ...
Wenbao Jiang   +3 more
openaire   +1 more source

Directed Acyclic Graph‐Based Blockchain Performance Analysis and Its Secure Operation in Opportunistic Networks

open access: yesIET Software, Volume 2026, Issue 1, 2026.
Directed acyclic graph (DAG)‐based blockchain is a promising paradigm of a blockchain system. During DAG‐based consensus processes, nodes generate blocks in parallel, as well as voting YES on the previous blocks. It makes the DAG‐based blockchain a performance advantage in terms of confirmation delay and transaction throughput.
Ruilin Lai   +6 more
wiley   +1 more source

Design and Development of a Blockchain‐Enabled Decentralized Framework for Academic Microcredentials

open access: yesIET Software, Volume 2026, Issue 1, 2026.
Traditional higher education faces significant challenges, including rising costs, inflexibility, and a disconnect from workforce demands, while current credentialing systems are often centralized and vulnerable to fraud. Microcredentials have emerged as a solution, yet they lack integration into formal degree pathways and face issues with recognition ...
Abrar Mahbub Tanim   +4 more
wiley   +1 more source

A Private Blockchain and IPFS‐Based Secure and Decentralized Framework for People Surveillance via Deep Learning Techniques

open access: yesIET Software, Volume 2026, Issue 1, 2026.
The modern metropolis essentially demands the use of state‐of‐the‐art, real‐time surveillance systems, which should be reliable, scalable, and respectful of privacy at the same time. Critical shortcomings in traditional architectures are single points of failure, poor scalability, frequent data breaches, and inadequately managed privacy.
Shihab Sarar   +4 more
wiley   +1 more source

Frontiers of Blockchain Applications in HRM: An Exploration Through Theoretical Integration and Qualitative Inquiry

open access: yesAsia Pacific Journal of Human Resources, Volume 64, Issue 1, January 2026.
ABSTRACT Blockchain technology is a disruptive technology known for its use in financial services, supply chains and cryptocurrencies; however, it remains relatively underutilised in human resource management (HRM). This study aims to explore current and potential future uses of blockchain in strategic and operational HRM and examines the enablers and ...
Patricia Iglesias   +2 more
wiley   +1 more source

Tamper-proof strategy of dynamic hash chain for smart grid cloud storage based on reinforcement learning key update mechanism

open access: yesDiscover Computing
Cloud storage systems in smart grids face dual challenges: ensuring data integrity while maintaining real-time responsiveness when managing large-scale power data.
Bo Feng   +5 more
doaj   +1 more source

A Study on zk-SNARK-Based RBAC Scheme in a Cross-Domain Cloud Environment

open access: yesApplied Sciences
Because of the advancement of IT, cross-domain environments have emerged where independent clouds with different security policies share data. However, sharing data between clouds with heterogeneous security levels is a challenging task, and most ...
Seong Cheol Yoon   +3 more
doaj   +1 more source

The Myths of Blockchain Governance

open access: yesCorporate Governance: An International Review, Volume 34, Issue 1, Page 154-162, January 2026.
ABSTRACT Research Question/Issue Blockchain technology promises to revolutionize governance through strong commitments, trustlessness, and transparency. This paper examines how these promises have failed to materialize in practice. Research Findings/Insights Drawing on case evidence from major blockchains, including Bitcoin and Ethereum, I argue that ...
Daniel Ferreira
wiley   +1 more source

Linking the NETSARC+ National Sarcoma Database With the SNDS to Evaluate Adjuvant and/or Neoadjuvant Therapy: Report on the Linkage Process and Result (Health Data Hub's DEEPSARC Pilot Project)

open access: yesFundamental &Clinical Pharmacology, Volume 40, Issue 1, January 2026.
ABSTRACT Background DEEPSARC, one of the first projects running on the Health Data Hub, aimed to identify real‐life treatment regimens that could improve overall survival. The project is based on matching the national database of the sarcoma reference network with the SNDS.
Erwan Drezen   +12 more
wiley   +1 more source

Secure resource metering and accounting with hash chain in cloud storage

open access: yesTongxin xuebao, 2013
Cloud storage is a pay-per-use service of which the billing plan is typically based on users' resource consump-tion metered by server side. Therefore, the trustworthiness between payer and service provider becomes a key factor for the business, and ...
Mei LIU   +5 more
doaj  

Home - About - Disclaimer - Privacy