Results 191 to 200 of about 7,578 (241)
Blockchain-Based Information Security Protection Mechanism for the Traceability of Intellectual Property Transactions. [PDF]
Wang Z +5 more
europepmc +1 more source
Eliminating single points of trust: a hybrid quantum and post-quantum blockchain with distributed key generation. [PDF]
Goh KW +5 more
europepmc +1 more source
Block Search and Existence Verification in Private Block Chains using Hash Look-Up Table
Pulkit Kakkar, Akansha Agnihotri, Divya
openalex +1 more source
Anonymous and Efficient Chaotic Map-Based Authentication Protocol for Industrial Internet of Things. [PDF]
Zeng D +6 more
europepmc +1 more source
Enhancing IIoT security through blockchain-enabled workload analysis in fog computing environments. [PDF]
Samriya JK +7 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Determining Minimum Hash Width for Hash Chains
Proceedings of the Third Central European Cybersecurity Conference, 2019Cryptographic hash functions are used in authentication, and repeated application in hash chains is used in communication protocols. In embedded devices, the width of hash values and the associated effort to evaluate the hash function is crucial, and hence the hash values should be as short as possible but should still be sufficient to guarantee the ...
Martin Dietzfelbinger, Jörg Keller
openaire +1 more source
Divisible Blind Signatures based on Hash Chains
International Journal of Computers and Applications, 2004AbstractThis article presents an efficient divisible blind signature scheme that makes it possible to divide a blind signature with a specified value into a sequence of subsignatures with smaller values for a sequence of different designated verifications.
Fan, C. I., Lei, C. L.
openaire +1 more source
Hash Function Vulnerability Index and Hash Chain Attacks
2007 3rd IEEE Workshop on Secure Network Protocols, 2007A hash chain is constructed by repeated hashing from an initial value. While it finds applications for network protocol design it also poses threats to hash function one-way and collision-free properties. We investigate the complexity of breaking hash function security properties by hash chain attacks using probabilistic algorithms.
openaire +1 more source
IJTAG Integrity Checking with Chained Hashing
2018 IEEE International Test Conference (ITC), 2018The JTAG port is a well-known vector for attacks that attempt to gain access to a chip’s internal circuitry. Such attacks may modify or extract proprietary data and can lead to misconfigured chips and IP theft. This paper uses a hash-based signature created through the history of the data shifted into and out of a device via IJTAG to provide a measure ...
Senwen Kan, Jennifer Dworak
openaire +1 more source

