Results 201 to 210 of about 2,321,198 (259)

Secure cross-chain interaction solution in multi-blockchain environment. [PDF]

open access: yesHeliyon
Cheng L   +5 more
europepmc   +1 more source

Client engagement solution for post implementation issues in software industry using blockchain. [PDF]

open access: yesSci Rep
Farooq MS   +6 more
europepmc   +1 more source

A Recursive Algorithm for General Hash Chain Traversal

2014 IEEE 17th International Conference on Computational Science and Engineering, 2014
A hash chain is a popular tool for improving the efficiency of several cryptographic applications. In spite of the computation efficiency of one-way function, the performance issue is a challenging research topic for chains with long length in resource-constrained environments.
Yi-Wen Peng, Wei-Mei Chen
openaire   +3 more sources

A novel hash chain construction for simple and efficient authentication

2016 14th Annual Conference on Privacy, Security and Trust (PST), 2016
These years Internet of Things (IoT) has been paid much attention to and the importance of lightweight and efficient authentication protocols has been increasing. In this paper, we propose a novel and flexible hash chain construction, hash chain aggregation (HCA), and a scheme to establish a common key for two users using HCA.
Masakazu Soshi, Yuta Kurihara
openaire   +3 more sources

A Study on Hash Chain-Based Hadoop Security Scheme

2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015
Hadoop is one of well-known "Big Data" frameworks studied widely and used by major vendors such as Yahoo! and Facebook. However current version of Hadoop Framework has a number of security vulnerabilities in its architecture and also in its implementation.
Si-Jae Woo, Sang-Soo Yeo, Young-Ae Jung
openaire   +2 more sources

zkChain: A privacy‐preserving model based on zk‐SNARKs and hash chain for efficient transfer of assets

Transactions on Emerging Telecommunications Technologies, 2022
As a distributed public ledger technology in a peer‐to‐peer network, blockchain has been widely used in a variety of Internet interaction systems in recent years, such as market supervision, property rights protection, and digital identity.
Jiahui Huang   +6 more
semanticscholar   +1 more source

A Reverse Hash Chain Path-Based Access Control Scheme for a Connected Smart Home System

IEEE Consumer Electronics Magazine, 2021
As smart home systems increasingly utilize AI technology, a user-friendly and intelligent smart home system becomes increasingly popular. However, a home generally consists of various devices with different capabilities from different vendors.
Daeyoub Kim, Jihoon Lee
semanticscholar   +1 more source

Key Distribution Strategy of Wireless Sensor Network Based on Multi-Hash Chain

Journal of Web Engineering, 2021
Key management is the basis of the security mechanism for wireless sensor networks and services, and random key pre-distribution is the most effective key management mechanism at present. However, there is a potential challenge to most current random key
Peng Xiong, Qinggang Su
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy