Results 231 to 240 of about 2,338,489 (263)
Some of the next articles are maybe not open access.
A multi-phase key pre-distribution scheme based on hash chain
International Conference on Fuzzy Systems and Knowledge Discovery, 2012Wireless sensor networks (WSNs) are usually deployed in the work area for a long time, but most key managements are not stable enough that brings great threats to the WSNs.
Yi Sun, Yongfeng Cao, Liangrui Tang
semanticscholar +1 more source
A Novel Self-Renewal Hash Chain and Its Implementation
2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, 2008Hash chains are widely used for entity authentication or data-origin authentication. However, finite length of a hash chain limits its implementations. A new kind of hash chain, called self-renewable hash chain (SRHC) is proposed, which achieves a hash chain self-renewing or re-initialization smoothly, securely throughout its usage.
Xiaoxue Li, Rui Ren, Haojun Zhang
openaire +2 more sources
MeHLDT: A multielement hash lock data transfer mechanism for on-chain and off-chain
Peer-to-Peer Networking and Applications, 2023Bei Yu+5 more
semanticscholar +1 more source
Right Transfer Method Based on Double HASH Chain
Applied Mechanics and Materials, 2014This Paper analyzes security issues during the process of the right transfer, sums up the basic needs during the transfer and the defects of existing rights transfer, and puts forward the right transfer program based on double HASH chain, which achieves the transfer of the digital right under the control of HASH Distance and meta-rights.
Ping Zhu, Mu Yao Lu
openaire +2 more sources
Improved Scalable Hash Chain Traversal
2003Yaron Sella recently proposed a scalable version of Jakobsson’s algorithm to traverse a hash chain of size n. Given the hash chain and a computation limit m (k=m+1 and \(b=\sqrt[k]{n}\)), Sella’s algorithm traverses the hash chain using a total of kb memory. We improve the memory usage to k(b-1).
openaire +2 more sources
A New Self-Updating Hash Chain Structure Scheme
2009 International Conference on Computational Intelligence and Security, 2009Self-Updating Hash Chain can be used extensively in many fields, such as one time password(OTP), signatures and authentication etc. In this paper, we propose a new self-updating hash chain based linear partition-combination algorithm (LPCA), which can share data into m parts and any part can’ t leak any information of data s. At a each exchange process,
Min-Qing Zhang, Xiao-Yuan Yang, Bin Dong
openaire +2 more sources
Wireless personal communications, 2020
Kh. Ghorbani, N. Orouji, M. Mosavi
semanticscholar +1 more source
Kh. Ghorbani, N. Orouji, M. Mosavi
semanticscholar +1 more source
Weighted One-Way Hash Chain and Its Applications
2000An one-way hash chain generated by the iterative use of a one-way hash function on a secret value has recently been widely employed to develop many practical cryptographic solutions, especially electronic micropayment schemes. In this paper, we propose a new concept called a weighted one-way hash chain. We then proceed to use the new concept to improve
Sung-Ming Yen, Yuliang Zheng
openaire +2 more sources
LightPay: A Lightweight and Secure Off-Chain Multi-Path Payment Scheme Based on Adapter Signatures
IEEE Transactions on Services ComputingThe payment channel network aims to solve the problems of long payment confirmation time and limited throughput in cryptocurrencies through off-chain payments.
Yaqin Liu+5 more
semanticscholar +1 more source
Scalable Hash Chain Traversal for Mobile Devices
2005Yaron Sella recently proposed a scalable version of Jakobsson's algorithm to traverse a hash chain of size n. Given the hash chain and a computation limit m (k=m+1 and (b = $\sqrt[k]{n}$)), Sella's algorithm traverses the hash chain using a total of kb memory. We improve the memory usage to k(b–1).
openaire +2 more sources