Results 251 to 260 of about 2,338,489 (263)
Some of the next articles are maybe not open access.
A Study on Hash Chain-Based Hadoop Security Scheme
2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015Young-Ae Jung, Si-Jae Woo, Sang-Soo Yeo
semanticscholar +1 more source
Malicious node detection in OppNets using hash chain technique
International Conference on Computer Science and Network Technology, 2015Majeed Alajeely, Asma'a Ahmad, R. Doss
semanticscholar +1 more source
Research on Cross-Chain Technology Based on Sidechain and Hash-Locking
International Conference on Edge Computing [Services Society], 2018L. Deng+3 more
semanticscholar +1 more source
Hash Function Based Optimal Block Chain Model for the Internet of Things (IoT)
Handbook of Multimedia Information Security, 2019A. Maseleno+4 more
semanticscholar +1 more source
A RFID Security Protocol Based on Hash Chain and Three-Way Handshake
International Conference Communication and Information Systems, 2013JianLiang Meng, Ze Wang
semanticscholar +1 more source
Self-renewal Hash chain based on geometric method
Journal of Computer Applications, 2011Yun-hao Liu+2 more
openaire +2 more sources
Improving scalability in vehicular communication using one-way hash chain method
Ad hoc networks, 2013A. Sulaiman, S. Raja, Sung Han Park
semanticscholar +1 more source