Results 131 to 140 of about 2,338,489 (263)
CHAIN: Exploring Global-Local Spatio-Temporal Information for Improved Self-Supervised Video Hashing [PDF]
Rukai Wei+5 more
openalex +1 more source
A Mobile Ad Hoc Network Public Key Encryption Algorithm Based on Hash-Chain
Feng Wang, Shang Qing-wei, Ke Cao
openalex +1 more source
On-Chain Video Copy Detection Based on Swin-Transformer and Deep Hashing [PDF]
Wenqian Shang, Xintao Liu, Miaoran Song
openalex +1 more source
Key Distribution using Double Keyed-hash Chains for Wireless Sensor Networks
Jianmin Zhang, Jianwei Tan, Jian Li
openalex +1 more source
T/Key: Second-Factor Authentication From Secure Hash Chains
Dmitry Kogan, Nathan Manohar, Dan Boneh
openalex +2 more sources
A self-healing key distribution scheme based on vector space secret sharing and one way hash chains [PDF]
Biming Tian+3 more
openalex +1 more source
A Lightweight Mutual Authentication Protocol based Hash Chain for Low-power RFID Systems [PDF]
Gi-Sung Lee
openalex +1 more source
Validator selection using pre-committed hash chains
Validators pre-commit hash chains of length w. When creating a block, validators commit the pre-image to the current hash in their hash chain, and combines it with the random number Selector, hash(x) ⊕ Selector. This random number selects the next validator.
openaire +2 more sources