Results 11 to 20 of about 2,377,005 (278)

Comparative Experiments of V2X Security Protocol Based on Hash Chain Cryptography. [PDF]

open access: yesSensors (Basel), 2020
Vehicle-to-everything (V2X) is the communication technology designed to support road safety for drivers and autonomous driving. The light-weight security solution is crucial to meet the real-time needs of on-board V2X applications.
Hakeem SAA, El-Gawad MAA, Kim H.
europepmc   +2 more sources

Efficient Constructions for One-way Hash Chains [PDF]

open access: green, 2003
Abstract: "One-way chains are an important cryptographic primitive in many security applications. Lamport first proposed to use one-way chains for one-time password authentication [19]. Subsequently, researchers proposed one-way chains as a basic building block for digital cash, for extending the lifetime of digital certificates, for constructing one ...
Yih‐Chun Hu   +2 more
openalex   +4 more sources

A Study on the Concept of Using Efficient Lightweight Hash Chain to Improve Authentication in VMF Military Standard

open access: yesApplied Sciences, 2020
Authentication algorithms in the form of cryptographic schemes, such as the Secure Hash Algorithm 1 (SHA-1) and the digital signature algorithm (DSA), specified in the current variable message format (VMF) military standard have numerous reliability ...
Dohoon Kim   +4 more
doaj   +2 more sources

Individual displacements in hashing with coalesced chains [PDF]

open access: greenCombinatorics, Probability and Computing, 2005
We study the asymptotic distribution of the displacements in hashing with coalesced chains, for both late-insertion and early-insertion. Asymptotic formulas for means and variances follow. The method uses Poissonization and some stochastic calculus.
Svante Janson
openalex   +5 more sources

Selective Location Blinding Using Hash Chains [PDF]

open access: green, 2011
Location-based applications require a user's movements and positions to provide customized services. However, location is a sensitive piece of information that should not be revealed unless strictly necessary. In this paper we propose a procedure that allows a user to control the precision in which his location information is exposed to a service ...
Gabriele Lenzini, Sjouke Mauw, Jun Pang
openalex   +5 more sources

Hey, That's My Model! Introducing Chain & Hash, An LLM Fingerprinting Technique [PDF]

open access: greenarXiv.org
Growing concerns over the theft and misuse of Large Language Models (LLMs) have heightened the need for effective fingerprinting, which links a model to its original version to detect misuse.
Mark Russinovich, Ahmed Salem
openalex   +2 more sources

Digital signatures over hash-entangled chains [PDF]

open access: bronzeSN Applied Sciences, 2019
In this work we introduce a new approach for digital signature based on hash chains. The method is supported on the well known security principles of hash functions. Some main advantages of this public key system include security and estimated efficiency through the so called signature chains.
Luis Adrián Lizama-Pérez
openalex   +3 more sources

Reversible and Plausibly Deniable Covert Channels in One-Time Passwords Based on Hash Chains [PDF]

open access: goldApplied Sciences, 2021
Covert channels enable stealthy communications over innocent appearing carriers. They are increasingly applied in the network context. However, little work is available that exploits cryptographic primitives in the networking context to establish such ...
Jörg Keller, Steffen Wendzel
doaj   +2 more sources

Migration mechanism of heterogeneous memory pages using a two-way Hash chain list [PDF]

open access: bronzeScientia Sinica Informationis, 2019
With the rapid development of big data technologies, the requirements of tremendously accessing memory are increasing, therebyresulting in a serious problem of high consumption power by accessing traditional DRAM memory.
Yanfei Ji   +3 more
openalex   +2 more sources

Separate Chaining Meets Compact Hashing

open access: green, 2019
Preprint of the local proceedings of the 173th SIGAL ...
Dominik Köppl
openalex   +4 more sources

Home - About - Disclaimer - Privacy