Results 201 to 210 of about 2,321,198 (259)
Secure cross-chain interaction solution in multi-blockchain environment. [PDF]
Cheng L+5 more
europepmc +1 more source
Client engagement solution for post implementation issues in software industry using blockchain. [PDF]
Farooq MS+6 more
europepmc +1 more source
TetRex: a novel algorithm for index-accelerated search of highly conserved motifs. [PDF]
Schwab RM, Gottlieb SG, Reinert K.
europepmc +1 more source
Efficient multicast source authentification using layered hash-chaining scheme
Yacine Challal+2 more
openalex +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
A Recursive Algorithm for General Hash Chain Traversal
2014 IEEE 17th International Conference on Computational Science and Engineering, 2014A hash chain is a popular tool for improving the efficiency of several cryptographic applications. In spite of the computation efficiency of one-way function, the performance issue is a challenging research topic for chains with long length in resource-constrained environments.
Yi-Wen Peng, Wei-Mei Chen
openaire +3 more sources
A novel hash chain construction for simple and efficient authentication
2016 14th Annual Conference on Privacy, Security and Trust (PST), 2016These years Internet of Things (IoT) has been paid much attention to and the importance of lightweight and efficient authentication protocols has been increasing. In this paper, we propose a novel and flexible hash chain construction, hash chain aggregation (HCA), and a scheme to establish a common key for two users using HCA.
Masakazu Soshi, Yuta Kurihara
openaire +3 more sources
A Study on Hash Chain-Based Hadoop Security Scheme
2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015Hadoop is one of well-known "Big Data" frameworks studied widely and used by major vendors such as Yahoo! and Facebook. However current version of Hadoop Framework has a number of security vulnerabilities in its architecture and also in its implementation.
Si-Jae Woo, Sang-Soo Yeo, Young-Ae Jung
openaire +2 more sources
Transactions on Emerging Telecommunications Technologies, 2022
As a distributed public ledger technology in a peer‐to‐peer network, blockchain has been widely used in a variety of Internet interaction systems in recent years, such as market supervision, property rights protection, and digital identity.
Jiahui Huang+6 more
semanticscholar +1 more source
As a distributed public ledger technology in a peer‐to‐peer network, blockchain has been widely used in a variety of Internet interaction systems in recent years, such as market supervision, property rights protection, and digital identity.
Jiahui Huang+6 more
semanticscholar +1 more source
A Reverse Hash Chain Path-Based Access Control Scheme for a Connected Smart Home System
IEEE Consumer Electronics Magazine, 2021As smart home systems increasingly utilize AI technology, a user-friendly and intelligent smart home system becomes increasingly popular. However, a home generally consists of various devices with different capabilities from different vendors.
Daeyoub Kim, Jihoon Lee
semanticscholar +1 more source
Key Distribution Strategy of Wireless Sensor Network Based on Multi-Hash Chain
Journal of Web Engineering, 2021Key management is the basis of the security mechanism for wireless sensor networks and services, and random key pre-distribution is the most effective key management mechanism at present. However, there is a potential challenge to most current random key
Peng Xiong, Qinggang Su
semanticscholar +1 more source