Results 21 to 30 of about 2,254,786 (237)
An Efficient data management Scheme for Hierarchical Multi-processing using Double Hash Chain
Recently, bit data is difficult to easily collect the desired data because big data is collected via the Internet. Big data is higher than the rate at which the data type and the period of time for which data is collected depending on the size of data ...
Yoon-Su Jeong+2 more
openalex +3 more sources
An Ordered Universal Accumulator Based on a Hash Chain
Cryptographic accumulators are now fundamental for secure applications across blockchain, IoT, and big data, powering anonymous credentials, streamlining key management, and enabling efficient data filtering.
Wenbao Jiang+3 more
doaj +2 more sources
Secure Authentication Protocol in Hadoop Distributed File System based on Hash Chain [PDF]
The various types of data are being created in large quantities resulting from the spread of social media and the mobile popularization. Many companies want to obtain valuable business information through the analysis of these large data. As a result, it
So Won Jeong, Kee Sung Kim, Ik Rae Jeong
openalex +2 more sources
P/Key: PUF based second factor authentication.
One-time password (OTP) mechanisms are widely used to strengthen authentication processes. In time-based one-time password (TOTP) mechanisms, the client and server store common secrets.
Ertan Uysal, Mete Akgün
doaj +2 more sources
Fast Counterfeit RFID Tags Detection With Slot Constraints
RFID tags are prone to counterfeit attacks in supply chain scenarios. The attacker often uses counterfeit tags to replace stolen tags to avoid being detected by the inventory process.
Bing Zhang, Xu Hu, Shan Gao
doaj +1 more source
Abstract Blockchain is increasingly lauded as an enabler of the transition to a circular economy. While there is considerable conceptual research and some empirical studies on this phenomenon, scholars have yet to develop a theoretical model of blockchain's role in this transition.
Moritz Böhmecke‐Schwafert+2 more
wiley +1 more source
Comparative Study and Analysis on Integrity of Data Files Using Different Tools and Techniques
Digital forensic investigation is the scientific process of collection, preservation, examination, analysis, documentation and presentation of digital evidence from digital devices, so that the evidence is in compliance with legal terms and acceptable in
Kumarshankar Raychaudhuri+2 more
doaj +1 more source
Getting back to (nucleo)base: Oligonucleotides incorporating a central 1‐ or 8‐mercuri‐6‐phenyl‐1H‐carbazole residue show great promise as high‐affinity hybridization probes, discriminating between all canonical nucleobases as well as 2‐ and 4‐thiothymines by melting temperature margins of at least 5 °C.
Tharun K. Kotammagari+2 more
wiley +1 more source
XOR Chain and Perfect Secrecy at the Dawn of the Quantum Era
In this article, we present a new method that achieves Shannon’s perfect secrecy. To achieve this property, we will introduce the triple XOR cancellation rule. The approach has two execution modes: digital signature and data encryption.
Luis Adrián Lizama-Pérez
doaj +1 more source
Towards roadmap to implement blockchain in healthcare systems based on a maturity model
This study presents a roadmap to develop a maturity model for blockchain in healthcare (MMBH) based on critical barriers (CBs), critical success factors (CSFs), and the best practices for blockchain implementation in healthcare systems. As a first step to develop the MMBH, in this paper, we present the initial results of a systematic literature review (
Muhammad Azeem Akbar+5 more
wiley +1 more source