Results 251 to 259 of about 2,321,198 (259)
Some of the next articles are maybe not open access.

2D Hash Chain robust Random Key Distribution scheme

Information Processing Letters, 2016
M. Ehdaie   +4 more
semanticscholar   +1 more source

Hash Chain

2011
openaire   +1 more source

Self-renewal Hash chain based on geometric method

Journal of Computer Applications, 2011
Yun-hao Liu   +2 more
openaire   +2 more sources

Research on Cross-Chain Technology Based on Sidechain and Hash-Locking

International Conference on Edge Computing [Services Society], 2018
L. Deng   +3 more
semanticscholar   +1 more source

Hash Function Based Optimal Block Chain Model for the Internet of Things (IoT)

Handbook of Multimedia Information Security, 2019
A. Maseleno   +4 more
semanticscholar   +1 more source

Securing one-way hash chain based incentive mechanism for vehicular ad hoc networks

Peer-to-Peer Networking and Applications, 2012
Joon-Sang Park, S. Baek
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy