Results 21 to 30 of about 2,377,005 (278)
Data-Tracking in Blockchain Utilizing Hash Chain: A Study of Structured and Adaptive Process [PDF]
This study presents a series of structured and adaptive processes aimed at tracking and verifying transactions recorded on the blockchain. Permissioned blockchains are employed across diverse enterprises for various purposes, including data recording ...
Sungbeen Kim, Dohoon Kim
openalex +2 more sources
Research on trusted DNP3-BAE protocol based on hash chain
To solve the security problem of industrial Ethernet DNP3 protocol broadcast authentication, the attack vector and security requirements of trusted DNP3 protocol are analysed.
Ye Lu, Tao Feng
doaj +2 more sources
Atomic and privacy-preserving cyclic cross-chain protocol based on chameleon hash function
Blockchain-based digital assets have increasingly emerged in recent years, necessitating cross-chain swaps. Hash Time-Lock Contract (HTLC) is a widely used protocol for such swaps; however, simple hash time locks can allow attackers to analyze ...
Mengyan Li, Maoning Wang, Meijiao Duan
doaj +2 more sources
A Survey of RFID Authentication Protocols Based on Hash-Chain Method [PDF]
Security and privacy are the inherent problems in RFID communications. There are several protocols have been proposed to overcome those problems. Hash chain is commonly employed by the protocols to improve security and privacy for RFID authentication ...
Irfan Syamsuddin +3 more
openalex +5 more sources
File Data Synchronization Method Based on Ordered Hash Chain [PDF]
This study aims to tackle the problems of low efficiency and local update difficulties in the existing file data synchronization transmission methods.To this end, it proposes a Hash chain construction and file data synchronization method.It takes the ...
ZENG Chang, JIANG Wenbao, GUO Yangnan
doaj +1 more source
Fast Counterfeit RFID Tags Detection With Slot Constraints
RFID tags are prone to counterfeit attacks in supply chain scenarios. The attacker often uses counterfeit tags to replace stolen tags to avoid being detected by the inventory process.
Bing Zhang, Xu Hu, Shan Gao
doaj +1 more source
XOR Chain and Perfect Secrecy at the Dawn of the Quantum Era
In this article, we present a new method that achieves Shannon’s perfect secrecy. To achieve this property, we will introduce the triple XOR cancellation rule. The approach has two execution modes: digital signature and data encryption.
Luis Adrián Lizama-Pérez
doaj +1 more source
Comparative Study and Analysis on Integrity of Data Files Using Different Tools and Techniques
Digital forensic investigation is the scientific process of collection, preservation, examination, analysis, documentation and presentation of digital evidence from digital devices, so that the evidence is in compliance with legal terms and acceptable in
Kumarshankar Raychaudhuri +2 more
doaj +1 more source
An Efficient data management Scheme for Hierarchical Multi-processing using Double Hash Chain
Yoon-Su Jeong +2 more
openalex +3 more sources
P/Key: PUF based second factor authentication
One-time password (OTP) mechanisms are widely used to strengthen authentication processes. In time-based one-time password (TOTP) mechanisms, the client and server store common secrets.
Ertan Uysal, Mete Akgün
doaj +2 more sources

