Results 241 to 250 of about 2,338,489 (263)
Some of the next articles are maybe not open access.

Efficient Sealed-bid Auction using Hash Chain

2001
This paper proposes the first sealed-bid auction method which uses only hash function. We use a hash chain to commit a bidding price. By using the hash chain, we can drastically reduce the time needed for bidding and opening bids. If we use a practical hash function e.g.
Hikaru Morita   +2 more
openaire   +1 more source

Secure mutual authentication and automated access control for IoT smart home using cumulative Keyed-hash chain

Journal of Information Security and Applications, 2019
M. Alshahrani, I. Traoré
semanticscholar   +1 more source

Research and Implementation of Cross-Chain Transaction Model Based on Improved Hash-Locking

International Conference on Blockchain and Trustworthy Systems, 2020
B. Dai   +5 more
semanticscholar   +1 more source

Hash Chains at the Basis of a Secure Reactive Routing Protocol

2012
Presently, the main concern of ad hoc routing protocols is no longer to find an optimal route to a given destination but to find the safe route free from malicious attackers. Several secure ad hoc routing protocols proposed, in the literature, are based on public key cryptography which drawback is to consume much more resources and decrease ...
openaire   +2 more sources

Hash chain based strong password authentication scheme

International Bhurban Conference on Applied Sciences and Technology, 2016
Muhammad Shahzad Jan, M. Afzal
semanticscholar   +1 more source

A novel hash chain construction for simple and efficient authentication

Conference on Privacy, Security and Trust, 2016
Yuta Kurihara, Masakazu Soshi
semanticscholar   +1 more source

2D Hash Chain robust Random Key Distribution scheme

Information Processing Letters, 2016
M. Ehdaie   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy