Results 251 to 259 of about 2,321,198 (259)
Some of the next articles are maybe not open access.
2D Hash Chain robust Random Key Distribution scheme
Information Processing Letters, 2016M. Ehdaie+4 more
semanticscholar +1 more source
Self-renewal Hash chain based on geometric method
Journal of Computer Applications, 2011Yun-hao Liu+2 more
openaire +2 more sources
Research on Cross-Chain Technology Based on Sidechain and Hash-Locking
International Conference on Edge Computing [Services Society], 2018L. Deng+3 more
semanticscholar +1 more source
Hash Function Based Optimal Block Chain Model for the Internet of Things (IoT)
Handbook of Multimedia Information Security, 2019A. Maseleno+4 more
semanticscholar +1 more source
Improving scalability in vehicular communication using one-way hash chain method
Ad hoc networks, 2013A. Sulaiman, S. Raja, Sung Han Park
semanticscholar +1 more source
Securing one-way hash chain based incentive mechanism for vehicular ad hoc networks
Peer-to-Peer Networking and Applications, 2012Joon-Sang Park, S. Baek
semanticscholar +1 more source