Results 241 to 250 of about 2,321,198 (259)
Some of the next articles are maybe not open access.
Weighted One-Way Hash Chain and Its Applications
2000An one-way hash chain generated by the iterative use of a one-way hash function on a secret value has recently been widely employed to develop many practical cryptographic solutions, especially electronic micropayment schemes. In this paper, we propose a new concept called a weighted one-way hash chain. We then proceed to use the new concept to improve
Sung-Ming Yen, Yuliang Zheng
openaire +2 more sources
Wireless personal communications, 2020
Kh. Ghorbani, N. Orouji, M. Mosavi
semanticscholar +1 more source
Kh. Ghorbani, N. Orouji, M. Mosavi
semanticscholar +1 more source
Efficient Sealed-bid Auction using Hash Chain
2001This paper proposes the first sealed-bid auction method which uses only hash function. We use a hash chain to commit a bidding price. By using the hash chain, we can drastically reduce the time needed for bidding and opening bids. If we use a practical hash function e.g.
Hikaru Morita+2 more
openaire +1 more source
Multi-dimensional Hash Chain For Sealed-Bid Auction
2004Sealed-bid electronic auction is an electronic auction where each submitted bid can be opened only after the closing time of the bid. A number of hash-based approaches were proposed which have advantages over non hash-based approaches due to the simplicity and efficiency of hash.
Navapot Prakobpol+1 more
openaire +2 more sources
Scalable Hash Chain Traversal for Mobile Devices
2005Yaron Sella recently proposed a scalable version of Jakobsson's algorithm to traverse a hash chain of size n. Given the hash chain and a computation limit m (k=m+1 and (b = $\sqrt[k]{n}$)), Sella's algorithm traverses the hash chain using a total of kb memory. We improve the memory usage to k(b–1).
openaire +2 more sources
Journal of Information Security and Applications, 2019
M. Alshahrani, I. Traoré
semanticscholar +1 more source
M. Alshahrani, I. Traoré
semanticscholar +1 more source
Research and Implementation of Cross-Chain Transaction Model Based on Improved Hash-Locking
International Conference on Blockchain and Trustworthy Systems, 2020B. Dai+5 more
semanticscholar +1 more source
One-time password based on hash chain without shared secret and re-registration
Computers & security, 2018Chang-Seop Park
semanticscholar +1 more source
Explicit Optimal Binary Pebbling for One-Way Hash Chain Reversal
Financial Cryptography, 2016Berry Schoenmakers
semanticscholar +1 more source
High-dimentional data authentication protocol based on hash chain for Hadoop systems
Cluster Computing, 2016Yoon-Su Jeong+2 more
semanticscholar +1 more source