Results 211 to 220 of about 2,321,198 (259)
Some of the next articles are maybe not open access.

A Decentralized Cross-Chain Service Protocol based on Notary Schemes and Hash-Locking

IEEE International Conference on Services Computing, 2022
With the rapid development of blockchain technology, its applications have been extended to various fields such as supply chains, the internet of things, and finance. However, different blockchains cannot directly interconnect due to discrepancies in the
Yangyang Sun   +3 more
semanticscholar   +1 more source

A Reverse Sequence Hash Chain-based Access Control for a Smart Home System

IEEE International Conference on Consumer Electronics, 2020
As a smart home system utilizes a machine learning technology, intelligent and user-friendly smart home systems will be trends more and more. However, since a consumer home generally consists of various IoT-devices which are with different capabilities ...
Daeyoub Kim
semanticscholar   +1 more source

Determining Minimum Hash Width for Hash Chains

Proceedings of the Third Central European Cybersecurity Conference, 2019
Cryptographic hash functions are used in authentication, and repeated application in hash chains is used in communication protocols. In embedded devices, the width of hash values and the associated effort to evaluate the hash function is crucial, and hence the hash values should be as short as possible but should still be sufficient to guarantee the ...
Martin Dietzfelbinger, Jörg Keller
openaire   +2 more sources

Hash Function Vulnerability Index and Hash Chain Attacks [PDF]

open access: possible2007 3rd IEEE Workshop on Secure Network Protocols, 2007
A hash chain is constructed by repeated hashing from an initial value. While it finds applications for network protocol design it also poses threats to hash function one-way and collision-free properties. We investigate the complexity of breaking hash function security properties by hash chain attacks using probabilistic algorithms.
openaire   +1 more source

Infinite length hash chains and their applications

Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003
Hash chains are used extensively in various cryptography applications such as one-time passwords, server-supported signatures and micropayments. In this paper, we present a method, called infinite length hash chains to improve the flexibility of this chaining idea by using public-key techniques.
Bicakci, K, Baykal, Nazife
openaire   +3 more sources

Hash chains with diminishing ranges for sensors

International Journal of High Performance Computing and Networking, 2004
Sensors and other constrained devices periodically transmit small information packets motivating the study of hash chains with small domains and ranges. Hash chain based protocols use deferred disclosure and it is often assumed their hash functions are one-way, thus essentially unbreakable.
Phillip G. Bradford, O.V. Gavrylyako
openaire   +3 more sources

Divisible Blind Signatures based on Hash Chains

International Journal of Computers and Applications, 2004
AbstractThis article presents an efficient divisible blind signature scheme that makes it possible to divide a blind signature with a specified value into a sequence of subsignatures with smaller values for a sequence of different designated verifications.
Fan, C. I., Lei, C. L.
openaire   +2 more sources

IJTAG Integrity Checking with Chained Hashing

2018 IEEE International Test Conference (ITC), 2018
The JTAG port is a well-known vector for attacks that attempt to gain access to a chip’s internal circuitry. Such attacks may modify or extract proprietary data and can lead to misconfigured chips and IP theft. This paper uses a hash-based signature created through the history of the data shifted into and out of a device via IJTAG to provide a measure ...
Senwen Kan, Jennifer Dworak
openaire   +2 more sources

Cost Effective Hash Chain Based Key Pre-Distribution Scheme for Wireless Sensor Network

International Conference on Speech Technology and Human-Computer Dialogue, 2018
In wireless sensor network (WSN), a secure link in the key pre-distribution (KP) scheme may be compromised when sensor nodes are captured. Accordingly, the KP q- composite scheme was proposed to tackle this node-capture problem.
Ching-Nung Yang   +4 more
semanticscholar   +1 more source

A Lightweight Synchronous Cryptographic Hash Chain Solution to Securing the Vehicle CAN bus

2018 IEEE International Multidisciplinary Conference on Engineering Technology (IMCET), 2018
The Controller Area Network (CAN) bus is the de facto standard for communication inside the vehicle between its Electronic Control Units (ECUs) and the various sensors that are distributed throughout the body and powertrain of the vehicle.
Joe Halabi, H. Artail
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy