Results 21 to 30 of about 7,578 (241)

P/Key: PUF based second factor authentication.

open access: yesPLoS ONE, 2023
One-time password (OTP) mechanisms are widely used to strengthen authentication processes. In time-based one-time password (TOTP) mechanisms, the client and server store common secrets.
Ertan Uysal, Mete Akgün
doaj   +2 more sources

XOR Chain and Perfect Secrecy at the Dawn of the Quantum Era

open access: yesCryptography, 2023
In this article, we present a new method that achieves Shannon’s perfect secrecy. To achieve this property, we will introduce the triple XOR cancellation rule. The approach has two execution modes: digital signature and data encryption.
Luis Adrián Lizama-Pérez
doaj   +1 more source

Comparative Study and Analysis on Integrity of Data Files Using Different Tools and Techniques

open access: yesJournal of Information Security and Cybercrimes Research, 2021
Digital forensic investigation is the scientific process of collection, preservation, examination, analysis, documentation and presentation of digital evidence from digital devices, so that the evidence is in compliance with legal terms and acceptable in
Kumarshankar Raychaudhuri   +2 more
doaj   +1 more source

A Defense Scheme of Primary User Emulation Attack in Cognitive Radio [PDF]

open access: yesJisuanji gongcheng, 2016
In order to avoid the adverse effects of the Primary User Emulation Attack(PUEA) in Cognitive Radio(CR) network,an authentication scheme based on Hash chain is proposed.Two occasions are considered in this scheme,one is PUEA between primary users and ...
MA Shenghong,LONG Min
doaj   +1 more source

A Data Preservation Method Based on Blockchain and Multidimensional Hash for Digital Forensics

open access: yesComplexity, 2021
Since digital forensics becomes more and more popular, more and more attention has been paid to the originality and validity of data, and data preservation technology emerges as the times require.
Gongzheng Liu, Jingsha He, Xinggang Xuan
doaj   +1 more source

User privacy prevention model using supervised federated learning‐based block chain approach for internet of Medical Things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan   +7 more
wiley   +1 more source

Hash-Chain-Based Cross-Regional Safety Authentication for Space-Air-Ground Integrated VANETs

open access: yesApplied Sciences, 2020
With the increasing demand for intelligent traffic management and road network intelligent information services, the vehicular ad hoc networks (VANETs) combined with information of air, space and ground have outstanding advantages in coverage, reliable ...
Gege Luo   +3 more
doaj   +1 more source

Hash-Based Signature with Constant-Sum Fingerprinting and Partial Construction of Hash Chains

open access: hybridProceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018
Yuichi Kaji   +2 more
openalex   +2 more sources

Selective Location Blinding Using Hash Chains [PDF]

open access: yes, 2011
Location-based applications require a user's movements and positions to provide customized services. However, location is a sensitive piece of information that should not be revealed unless strictly necessary. In this paper we propose a procedure that allows a user to control the precision in which his location information is exposed to a service ...
Lenzini, Gabriele   +2 more
openaire   +2 more sources

Vertical coordination in agri‐food supply chain and blockchain: A proposed framework solution for Vietnamese cashew nut business

open access: yesRegional Science Policy &Practice, EarlyView., 2022
Abstract The agri‐food supply chain has been a popular research topic in recent years. The combination of a demand for products of high quality and safety standards and the increasing number of stakeholders in supply chain networks has required the agri‐food business to transform from vertically integrated to vertically operated supply chain networks ...
Thanh_Tuan Chu, Thi Thu Tra Pham
wiley   +1 more source

Home - About - Disclaimer - Privacy