Results 251 to 260 of about 2,338,489 (263)
Some of the next articles are maybe not open access.

Hash Chain

2011
openaire   +1 more source

A Study on Hash Chain-Based Hadoop Security Scheme

2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015
Young-Ae Jung, Si-Jae Woo, Sang-Soo Yeo
semanticscholar   +1 more source

Malicious node detection in OppNets using hash chain technique

International Conference on Computer Science and Network Technology, 2015
Majeed Alajeely, Asma'a Ahmad, R. Doss
semanticscholar   +1 more source

Research on Cross-Chain Technology Based on Sidechain and Hash-Locking

International Conference on Edge Computing [Services Society], 2018
L. Deng   +3 more
semanticscholar   +1 more source

Hash Function Based Optimal Block Chain Model for the Internet of Things (IoT)

Handbook of Multimedia Information Security, 2019
A. Maseleno   +4 more
semanticscholar   +1 more source

A RFID Security Protocol Based on Hash Chain and Three-Way Handshake

International Conference Communication and Information Systems, 2013
JianLiang Meng, Ze Wang
semanticscholar   +1 more source

Self-renewal Hash chain based on geometric method

Journal of Computer Applications, 2011
Yun-hao Liu   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy