Results 201 to 210 of about 2,377,005 (278)

Toward owner governance in genomic data privacy with Governome. [PDF]

open access: yesCell Rep Methods
Zhang J   +8 more
europepmc   +1 more source

A novel hash chain construction for simple and efficient authentication

2016 14th Annual Conference on Privacy, Security and Trust (PST), 2016
These years Internet of Things (IoT) has been paid much attention to and the importance of lightweight and efficient authentication protocols has been increasing. In this paper, we propose a novel and flexible hash chain construction, hash chain aggregation (HCA), and a scheme to establish a common key for two users using HCA.
Masakazu Soshi, Yuta Kurihara
openaire   +3 more sources

Hash chain based strong password authentication scheme

2016 13th International Bhurban Conference on Applied Sciences and Technology (IBCAST), 2016
The constant influence of passwords over all other methods of identity authentication is a key discomfiture to security examiners. Web technologies are gaining more and more fame day by day but the persistent survival and replication of password authentication schemes generate difficulties for end users.
Muhammad Shahzad Jan, Mehreen Afzal
openaire   +3 more sources

A Study on Hash Chain-Based Hadoop Security Scheme

2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015
Hadoop is one of well-known "Big Data" frameworks studied widely and used by major vendors such as Yahoo! and Facebook. However current version of Hadoop Framework has a number of security vulnerabilities in its architecture and also in its implementation.
Si-Jae Woo, Sang-Soo Yeo, Young-Ae Jung
openaire   +2 more sources

zkChain: A privacy‐preserving model based on zk‐SNARKs and hash chain for efficient transfer of assets

Transactions on Emerging Telecommunications Technologies, 2022
As a distributed public ledger technology in a peer‐to‐peer network, blockchain has been widely used in a variety of Internet interaction systems in recent years, such as market supervision, property rights protection, and digital identity.
Jiahui Huang   +6 more
semanticscholar   +1 more source

A Lightweight Hash-Chain-Based Multi-Node Mutual Authentication Algorithm for IoT Networks

2022 IEEE Future Networks World Forum (FNWF), 2022
As an emerging technology, IoT is rapidly revolutionizing the global communication network with billions of new devices deployed and connected with each other.
Shengli Yuan, Randy Phan-Huynh
semanticscholar   +1 more source

Cycle‐Consistent Generative Adversarial Network and Crypto Hash Signature Token‐based Block chain Technology for Data Aggregation with Secured Routing in Wireless Sensor Networks

International Journal of Communication Systems, 2023
A fundamental component of Wireless Sensor Networks (WSN) is routing, because it is responsible for data transmission to the base stations (BS). Routing attacks are attacks that have the ability to interfere with the operation of WSN.
Dr. Ashwinth Janarthanan   +1 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy