Data Component Method Based on Dual-Factor Ownership Identification with Multimodal Feature Fusion. [PDF]
Nie S, Shi J, Zhou X, Lu M.
europepmc +1 more source
Ethical AI in Healthcare: Integrating Zero-Knowledge Proofs and Smart Contracts for Transparent Data Governance. [PDF]
Ezz M, Alaerjan AS, Mostafa AM.
europepmc +1 more source
Privacy-preserving computation scheme for the maximum and minimum values of the sums of keyword-corresponding values in cross-chain data exchange. [PDF]
Liu X +9 more
europepmc +1 more source
Video Streaming Security: Reliable Hash Chain Mechanism Using Redundancy Codes
Emad Abd-Elrahman +2 more
openalex +1 more source
Chameleon hash function based on SM3 and its applications
The immutability of blockchain technology was known to ensure that once data was added to the chain, it could not be altered, which meant that any harmful information uploaded would continue to exert serious negative impacts. To ensure that on-chain data
ZHAO Xianxin +3 more
doaj
Comparative evaluation and simulation of blockchain consensus mechanisms for secure and scalable peer to peer energy trading in microgrids. [PDF]
Bhavana GB +5 more
europepmc +1 more source
Implementing Hashing Using Separate Chaining in Java
Timothy M. Dietrich, Nicholas J. DeLillo
openalex +1 more source
Blockchain consensus algorithm for supply chain information security sharing based on convolutional neural networks. [PDF]
Cai L, Liu A, Yan Y.
europepmc +1 more source
Secure and scalable dual blockchain and IPFS driven IoT ecosystem for next gen healthcare systems. [PDF]
Mallick SR, Lenka RK, Sobhanayak S.
europepmc +1 more source
HashWave: blockchain-powered perceptual hashing for resilient audio piracy detection against signal-processing attacks in decentralized networks. [PDF]
Pandey S +3 more
europepmc +1 more source

