Results 201 to 210 of about 2,338,489 (263)
Efficient information exchange approach for medical IoT based on AI and DAG-enabled blockchain. [PDF]
Wang S, Du G, Dai S, Miao M, Zhang M.
europepmc +1 more source
Applications of blockchain technology in peer-to-peer energy markets and green hydrogen supply chains: a topical review. [PDF]
Bhavana GB+5 more
europepmc +1 more source
Efficient multicast source authentification using layered hash-chaining scheme
Yacine Challal+2 more
openalex +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Transactions on Emerging Telecommunications Technologies, 2022
As a distributed public ledger technology in a peer‐to‐peer network, blockchain has been widely used in a variety of Internet interaction systems in recent years, such as market supervision, property rights protection, and digital identity.
Jiahui Huang+6 more
semanticscholar +1 more source
As a distributed public ledger technology in a peer‐to‐peer network, blockchain has been widely used in a variety of Internet interaction systems in recent years, such as market supervision, property rights protection, and digital identity.
Jiahui Huang+6 more
semanticscholar +1 more source
A Lightweight Hash-Chain-Based Multi-Node Mutual Authentication Algorithm for IoT Networks
2022 IEEE Future Networks World Forum (FNWF), 2022As an emerging technology, IoT is rapidly revolutionizing the global communication network with billions of new devices deployed and connected with each other.
Shengli Yuan, Randy Phan-Huynh
semanticscholar +1 more source
A Reverse Hash Chain Path-Based Access Control Scheme for a Connected Smart Home System
IEEE Consumer Electronics Magazine, 2021As smart home systems increasingly utilize AI technology, a user-friendly and intelligent smart home system becomes increasingly popular. However, a home generally consists of various devices with different capabilities from different vendors.
Daeyoub Kim, Jihoon Lee
semanticscholar +1 more source
Key Distribution Strategy of Wireless Sensor Network Based on Multi-Hash Chain
Journal of Web Engineering, 2021Key management is the basis of the security mechanism for wireless sensor networks and services, and random key pre-distribution is the most effective key management mechanism at present. However, there is a potential challenge to most current random key
Peng Xiong, Qinggang Su
semanticscholar +1 more source