On-Chain Video Copy Detection Based on Swin-Transformer and Deep Hashing [PDF]
Wenqian Shang, Xintao Liu, Miaoran Song
openalex +1 more source
Key Distribution using Double Keyed-hash Chains for Wireless Sensor Networks
Jianmin Zhang, Jianwei Tan, Jian Li
openalex +1 more source
T/Key: Second-Factor Authentication From Secure Hash Chains
Dmitry Kogan, Nathan Manohar, Dan Boneh
openalex +2 more sources
A self-healing key distribution scheme based on vector space secret sharing and one way hash chains [PDF]
Biming Tian+3 more
openalex +1 more source
A Lightweight Mutual Authentication Protocol based Hash Chain for Low-power RFID Systems [PDF]
Gi-Sung Lee
openalex +1 more source
A method for the protection of the message in social network service(SNS) using access control and hash-chain [PDF]
Hanjae Jeong, Dongho Won
openalex +1 more source
A Key Distribution Scheme for WSN Based on Hash Chains and Deployment Knowledge [PDF]
Lin You+3 more
openalex +1 more source
Hash-Based Signature with Constant-Sum Fingerprinting and Partial Construction of Hash Chains
Yoshio Yatani+2 more
openaire +2 more sources
A Lightweight Accountable Parallel Blockchain Architecture Based on Redactable Blockchain for Agri-Food Traceability. [PDF]
Chen F, Zhao C, Yang X, Luo N, Sun C.
europepmc +1 more source