Results 241 to 250 of about 2,338,489 (263)
Some of the next articles are maybe not open access.
Efficient Sealed-bid Auction using Hash Chain
2001This paper proposes the first sealed-bid auction method which uses only hash function. We use a hash chain to commit a bidding price. By using the hash chain, we can drastically reduce the time needed for bidding and opening bids. If we use a practical hash function e.g.
Hikaru Morita+2 more
openaire +1 more source
Journal of Information Security and Applications, 2019
M. Alshahrani, I. Traoré
semanticscholar +1 more source
M. Alshahrani, I. Traoré
semanticscholar +1 more source
Research and Implementation of Cross-Chain Transaction Model Based on Improved Hash-Locking
International Conference on Blockchain and Trustworthy Systems, 2020B. Dai+5 more
semanticscholar +1 more source
One-time password based on hash chain without shared secret and re-registration
Computers & security, 2018Chang-Seop Park
semanticscholar +1 more source
Hash Chains at the Basis of a Secure Reactive Routing Protocol
2012Presently, the main concern of ad hoc routing protocols is no longer to find an optimal route to a given destination but to find the safe route free from malicious attackers. Several secure ad hoc routing protocols proposed, in the literature, are based on public key cryptography which drawback is to consume much more resources and decrease ...
openaire +2 more sources
Hash chain based strong password authentication scheme
International Bhurban Conference on Applied Sciences and Technology, 2016Muhammad Shahzad Jan, M. Afzal
semanticscholar +1 more source
Explicit Optimal Binary Pebbling for One-Way Hash Chain Reversal
Financial Cryptography, 2016Berry Schoenmakers
semanticscholar +1 more source
High-dimentional data authentication protocol based on hash chain for Hadoop systems
Cluster Computing, 2016Yoon-Su Jeong+2 more
semanticscholar +1 more source
A novel hash chain construction for simple and efficient authentication
Conference on Privacy, Security and Trust, 2016Yuta Kurihara, Masakazu Soshi
semanticscholar +1 more source
2D Hash Chain robust Random Key Distribution scheme
Information Processing Letters, 2016M. Ehdaie+4 more
semanticscholar +1 more source