Video Streaming Security: Reliable Hash Chain Mechanism Using Redundancy Codes
Emad Abd-Elrahman+2 more
openalex +1 more source
ACHealthChain blockchain framework for access control and privacy preservation in healthcare. [PDF]
Tawfik AM+3 more
europepmc +1 more source
A cross-chain model for warehouse receipts in port supply chain based on notary mechanism and ShangMi cryptographic algorithms. [PDF]
Chen Y+5 more
europepmc +1 more source
Some techniques for structuring chained hash tables [PDF]
openaire +2 more sources
A survey of sequence-to-graph mapping algorithms in the pangenome era. [PDF]
Cui Y, Peng C, Xia Z, Yang C, Guo Y.
europepmc +1 more source
Blockchain enabled traceability in the jewel supply chain. [PDF]
Patel A+4 more
europepmc +1 more source
RLH: Receiver driven layered hash chaining for multicast data origin authentification
Yacine Challal+2 more
openalex +3 more sources
Practical security analysis and attack strategies on permutation functions used in IoT supply chain systems. [PDF]
Mokhtari N+5 more
europepmc +1 more source
Efficient multicast source authentication using layered hash-chaining scheme [PDF]
Yacine Challal+2 more
openalex +1 more source