A Lightweight Mutual Authentication Protocol based Hash Chain for Low-power RFID Systems [PDF]
Gi-Sung Lee
openalex +1 more source
Validator selection using pre-committed hash chains
Validators pre-commit hash chains of length w. When creating a block, validators commit the pre-image to the current hash in their hash chain, and combines it with the random number Selector, hash(x) ⊕ Selector. This random number selects the next validator.
openaire +2 more sources
Hey, That's My Model! Introducing Chain & Hash, An LLM Fingerprinting Technique [PDF]
Mark Russinovich, Ahmed Salem
openalex +1 more source
A method for the protection of the message in social network service(SNS) using access control and hash-chain [PDF]
Hanjae Jeong, Dongho Won
openalex +1 more source
Hash-Based Signature with Constant-Sum Fingerprinting and Partial Construction of Hash Chains
Yoshio Yatani+2 more
openaire +2 more sources
Lightweight Anonymous Authentication for IoT: A Taxonomy and Survey of Security Frameworks. [PDF]
Zhong J, He S, Liu Z, Xiong L.
europepmc +1 more source
A Key Distribution Scheme for WSN Based on Hash Chains and Deployment Knowledge [PDF]
Lin You+3 more
openalex +1 more source
Decentralizing video copyright protection: a novel blockchain-enabled framework with performance evaluation. [PDF]
Madapati SL, Pradhan NR.
europepmc +1 more source
Performance Evaluation of Separate Chaining for Concurrent Hash Maps [PDF]
A C Meira Castro+2 more
openalex +1 more source
Migration mechanism of heterogeneous memory pages using a two-way Hash chain list [PDF]
Yanfei Ji+3 more
openalex +1 more source