Results 111 to 120 of about 2,338,489 (263)
Secure resource metering and accounting with hash chain in cloud storage
Cloud storage is a pay-per-use service of which the billing plan is typically based on users' resource consump-tion metered by server side. Therefore, the trustworthiness between payer and service provider becomes a key factor for the business, and ...
Mei LIU+5 more
doaj +2 more sources
An Improved Broadcast Authentication Protocol for Wireless Sensor Networks Based on the Self-Reinitializable Hash Chains [PDF]
Haiping Huang+5 more
openalex +1 more source
Abstract Next‐generation sequencing data are widely utilised for various downstream applications in bioinformatics and numerous techniques have been developed for PCR‐deduplication and error‐correction to eliminate bias and errors introduced during the sequencing.
Pengyao Ping+4 more
wiley +1 more source
A Framework for Blockchain Interoperability and Runtime Selection
The suitability of a particular blockchain for a given use case depends mainly on the blockchain's functional and non-functional properties. Such properties may vary over time, and thus, a selected blockchain may become unsuitable for a given use case ...
Borkowski, Michael+2 more
core
An Authentication Scheme Based on Novel Construction of Hash Chains for Smart Mobile Devices [PDF]
Qinglong Huang+4 more
openalex +1 more source
Exploring the untapped potential of single‐cell and spatial omics in plant biology
Summary Advances in single‐cell and spatial omics technologies have revolutionised biology by revealing the diverse molecular states of individual cells and their spatial organization within tissues. The field of plant biology has widely adopted single‐cell transcriptome and chromatin accessibility profiling and spatial transcriptomics, which extend ...
Tatsuya Nobori
wiley +1 more source
Enhanced Hash Chain based Scheme for Security and Privacy in RFID Systems
research Paper describes security and privacy issues in RFID systems and proposes a new enhanced algorithm. Our proposed protocol is an enhancement over Sang-Soo Yeo and Sung Kwon Kim" protocol and it provides better security and privacy.
Vaibhaw Dixit, H. Verma, Akhil K. Singh
semanticscholar +1 more source
Mutual Friendly Force Identification Protocol based on Hash-Chain for Personal Combat Systems [PDF]
Jongkwan Lee
openalex +1 more source
We assess genetic evidence of hybridization between gray‐headed chickadees and boreal chickadees using mitochondrial DNA and nuclear DNA sequencing of individuals from historical and contemporary time periods. We detected two early‐generation hybrids among the historical boreal chickadee samples and none within the contemporary boreal chickadee samples
Matthew R. Armstrong+7 more
wiley +1 more source
Analysis of cross-chain technology of blockchain
With the development of blockchain technology,more and more blockchain projects have appeared.Due to the closure property of the blockchain,different blockchains have become islands of value.The information interaction and value transfer problems between
Zhao GUO+4 more
doaj +2 more sources