Results 201 to 210 of about 2,377,005 (278)
Toward owner governance in genomic data privacy with Governome. [PDF]
Zhang J +8 more
europepmc +1 more source
A byzantine-resistant blockchain framework for secure and scalable immigration management. [PDF]
Shafin KM, Reno S.
europepmc +1 more source
Efficient multicast source authentification using layered hash-chaining scheme
Yacine Challal +2 more
openalex +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
A novel hash chain construction for simple and efficient authentication
2016 14th Annual Conference on Privacy, Security and Trust (PST), 2016These years Internet of Things (IoT) has been paid much attention to and the importance of lightweight and efficient authentication protocols has been increasing. In this paper, we propose a novel and flexible hash chain construction, hash chain aggregation (HCA), and a scheme to establish a common key for two users using HCA.
Masakazu Soshi, Yuta Kurihara
openaire +3 more sources
Hash chain based strong password authentication scheme
2016 13th International Bhurban Conference on Applied Sciences and Technology (IBCAST), 2016The constant influence of passwords over all other methods of identity authentication is a key discomfiture to security examiners. Web technologies are gaining more and more fame day by day but the persistent survival and replication of password authentication schemes generate difficulties for end users.
Muhammad Shahzad Jan, Mehreen Afzal
openaire +3 more sources
A Study on Hash Chain-Based Hadoop Security Scheme
2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015Hadoop is one of well-known "Big Data" frameworks studied widely and used by major vendors such as Yahoo! and Facebook. However current version of Hadoop Framework has a number of security vulnerabilities in its architecture and also in its implementation.
Si-Jae Woo, Sang-Soo Yeo, Young-Ae Jung
openaire +2 more sources
Transactions on Emerging Telecommunications Technologies, 2022
As a distributed public ledger technology in a peer‐to‐peer network, blockchain has been widely used in a variety of Internet interaction systems in recent years, such as market supervision, property rights protection, and digital identity.
Jiahui Huang +6 more
semanticscholar +1 more source
As a distributed public ledger technology in a peer‐to‐peer network, blockchain has been widely used in a variety of Internet interaction systems in recent years, such as market supervision, property rights protection, and digital identity.
Jiahui Huang +6 more
semanticscholar +1 more source
A Lightweight Hash-Chain-Based Multi-Node Mutual Authentication Algorithm for IoT Networks
2022 IEEE Future Networks World Forum (FNWF), 2022As an emerging technology, IoT is rapidly revolutionizing the global communication network with billions of new devices deployed and connected with each other.
Shengli Yuan, Randy Phan-Huynh
semanticscholar +1 more source
International Journal of Communication Systems, 2023
A fundamental component of Wireless Sensor Networks (WSN) is routing, because it is responsible for data transmission to the base stations (BS). Routing attacks are attacks that have the ability to interfere with the operation of WSN.
Dr. Ashwinth Janarthanan +1 more
semanticscholar +1 more source
A fundamental component of Wireless Sensor Networks (WSN) is routing, because it is responsible for data transmission to the base stations (BS). Routing attacks are attacks that have the ability to interfere with the operation of WSN.
Dr. Ashwinth Janarthanan +1 more
semanticscholar +1 more source

