Results 171 to 180 of about 6,906 (225)
Leveraging blockchain and IoMT for secure and interoperable electronic health records. [PDF]
Othman SB, Getahun M.
europepmc +1 more source
A secure interoperable method for electronic health records exchange on cross platform blockchain network. [PDF]
Sonkamble RG+3 more
europepmc +1 more source
Efficient multicast source authentification using layered hash-chaining scheme
Yacine Challal+2 more
openalex +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Determining Minimum Hash Width for Hash Chains
Proceedings of the Third Central European Cybersecurity Conference, 2019Cryptographic hash functions are used in authentication, and repeated application in hash chains is used in communication protocols. In embedded devices, the width of hash values and the associated effort to evaluate the hash function is crucial, and hence the hash values should be as short as possible but should still be sufficient to guarantee the ...
Martin Dietzfelbinger, Jörg Keller
openaire +2 more sources
Hash Function Vulnerability Index and Hash Chain Attacks [PDF]
A hash chain is constructed by repeated hashing from an initial value. While it finds applications for network protocol design it also poses threats to hash function one-way and collision-free properties. We investigate the complexity of breaking hash function security properties by hash chain attacks using probabilistic algorithms.
openaire +1 more source