Results 231 to 240 of about 2,338,489 (263)
Some of the next articles are maybe not open access.

A multi-phase key pre-distribution scheme based on hash chain

International Conference on Fuzzy Systems and Knowledge Discovery, 2012
Wireless sensor networks (WSNs) are usually deployed in the work area for a long time, but most key managements are not stable enough that brings great threats to the WSNs.
Yi Sun, Yongfeng Cao, Liangrui Tang
semanticscholar   +1 more source

A Novel Self-Renewal Hash Chain and Its Implementation

2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, 2008
Hash chains are widely used for entity authentication or data-origin authentication. However, finite length of a hash chain limits its implementations. A new kind of hash chain, called self-renewable hash chain (SRHC) is proposed, which achieves a hash chain self-renewing or re-initialization smoothly, securely throughout its usage.
Xiaoxue Li, Rui Ren, Haojun Zhang
openaire   +2 more sources

MeHLDT: A multielement hash lock data transfer mechanism for on-chain and off-chain

Peer-to-Peer Networking and Applications, 2023
Bei Yu   +5 more
semanticscholar   +1 more source

Right Transfer Method Based on Double HASH Chain

Applied Mechanics and Materials, 2014
This Paper analyzes security issues during the process of the right transfer, sums up the basic needs during the transfer and the defects of existing rights transfer, and puts forward the right transfer program based on double HASH chain, which achieves the transfer of the digital right under the control of HASH Distance and meta-rights.
Ping Zhu, Mu Yao Lu
openaire   +2 more sources

Improved Scalable Hash Chain Traversal

2003
Yaron Sella recently proposed a scalable version of Jakobsson’s algorithm to traverse a hash chain of size n. Given the hash chain and a computation limit m (k=m+1 and \(b=\sqrt[k]{n}\)), Sella’s algorithm traverses the hash chain using a total of kb memory. We improve the memory usage to k(b-1).
openaire   +2 more sources

A New Self-Updating Hash Chain Structure Scheme

2009 International Conference on Computational Intelligence and Security, 2009
Self-Updating Hash Chain can be used extensively in many fields, such as one time password(OTP), signatures and authentication etc. In this paper, we propose a new self-updating hash chain based linear partition-combination algorithm (LPCA), which can share data into m parts and any part can’ t leak any information of data s. At a each exchange process,
Min-Qing Zhang, Xiao-Yuan Yang, Bin Dong
openaire   +2 more sources

Weighted One-Way Hash Chain and Its Applications

2000
An one-way hash chain generated by the iterative use of a one-way hash function on a secret value has recently been widely employed to develop many practical cryptographic solutions, especially electronic micropayment schemes. In this paper, we propose a new concept called a weighted one-way hash chain. We then proceed to use the new concept to improve
Sung-Ming Yen, Yuliang Zheng
openaire   +2 more sources

LightPay: A Lightweight and Secure Off-Chain Multi-Path Payment Scheme Based on Adapter Signatures

IEEE Transactions on Services Computing
The payment channel network aims to solve the problems of long payment confirmation time and limited throughput in cryptocurrencies through off-chain payments.
Yaqin Liu   +5 more
semanticscholar   +1 more source

Scalable Hash Chain Traversal for Mobile Devices

2005
Yaron Sella recently proposed a scalable version of Jakobsson's algorithm to traverse a hash chain of size n. Given the hash chain and a computation limit m (k=m+1 and (b = $\sqrt[k]{n}$)), Sella's algorithm traverses the hash chain using a total of kb memory. We improve the memory usage to k(b–1).
openaire   +2 more sources

Home - About - Disclaimer - Privacy