Results 231 to 240 of about 2,321,198 (259)
Some of the next articles are maybe not open access.

Foundations of security for hash chains in ad hoc networks

23rd International Conference on Distributed Computing Systems Workshops, 2003. Proceedings., 2004
Nodes in ad hoc networks generally transmit data at regular intervals over long periods of time. Recently, ad hoc network nodes have been built that run on little power and have very limited memory. Authentication is a significant challenge in ad hoc networks, even without considering size and power constraints.
Phillip G. Bradford, Olga V. Gavrylyako
openaire   +2 more sources

A RFID Security Protocol Based on Hash Chain and Three-Way Handshake

International Conference Communication and Information Systems, 2013
Radio Frequency Identification (RFID) technology is one of the important techniques of the Internet of Things, it has many security problems for it runs in open environment.
JianLiang Meng, Ze Wang
semanticscholar   +1 more source

A hierarchical two-tier one-way hash chain protocol for secure internet transactions

Global Communications Conference, 2012
One-way hash chains are a popular cryptographic technique used in many security applications. In this paper, we present a two-tier one-way hash chain (TTOHC) protocol to secure cookie-based Internet transactions.
Amerah A. Alabrah, M. Bassiouni
semanticscholar   +1 more source

A Novel Self-Renewal Hash Chain and Its Implementation

2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, 2008
Hash chains are widely used for entity authentication or data-origin authentication. However, finite length of a hash chain limits its implementations. A new kind of hash chain, called self-renewable hash chain (SRHC) is proposed, which achieves a hash chain self-renewing or re-initialization smoothly, securely throughout its usage.
Xiaoxue Li, Rui Ren, Haojun Zhang
openaire   +2 more sources

A multi-phase key pre-distribution scheme based on hash chain

International Conference on Fuzzy Systems and Knowledge Discovery, 2012
Wireless sensor networks (WSNs) are usually deployed in the work area for a long time, but most key managements are not stable enough that brings great threats to the WSNs.
Yi Sun, Yongfeng Cao, Liangrui Tang
semanticscholar   +1 more source

MeHLDT: A multielement hash lock data transfer mechanism for on-chain and off-chain

Peer-to-Peer Networking and Applications, 2023
Bei Yu   +5 more
semanticscholar   +1 more source

Improved Scalable Hash Chain Traversal

2003
Yaron Sella recently proposed a scalable version of Jakobsson’s algorithm to traverse a hash chain of size n. Given the hash chain and a computation limit m (k=m+1 and \(b=\sqrt[k]{n}\)), Sella’s algorithm traverses the hash chain using a total of kb memory. We improve the memory usage to k(b-1).
openaire   +2 more sources

A novel sender authentication scheme based on hash chain for Vehicular Ad-Hoc Networks

IEEE Symposium on Wireless Technology and Applications, 2011
Vehicular ad hoc networks (VANETs) are receiving enormous research attention in the wake of rising challenges of safe driving, and demand for infotainment services on the move. Information security in VANETs is a critical design issue, since public lives
N. V. Vighnesh   +3 more
semanticscholar   +1 more source

Right Transfer Method Based on Double HASH Chain

Applied Mechanics and Materials, 2014
This Paper analyzes security issues during the process of the right transfer, sums up the basic needs during the transfer and the defects of existing rights transfer, and puts forward the right transfer program based on double HASH chain, which achieves the transfer of the digital right under the control of HASH Distance and meta-rights.
Ping Zhu, Mu Yao Lu
openaire   +2 more sources

A New Self-Updating Hash Chain Structure Scheme

2009 International Conference on Computational Intelligence and Security, 2009
Self-Updating Hash Chain can be used extensively in many fields, such as one time password(OTP), signatures and authentication etc. In this paper, we propose a new self-updating hash chain based linear partition-combination algorithm (LPCA), which can share data into m parts and any part can’ t leak any information of data s. At a each exchange process,
Min-Qing Zhang, Xiao-Yuan Yang, Bin Dong
openaire   +2 more sources

Home - About - Disclaimer - Privacy