Results 21 to 30 of about 2,254,786 (237)

An Efficient data management Scheme for Hierarchical Multi-processing using Double Hash Chain

open access: bronze, 2015
Recently, bit data is difficult to easily collect the desired data because big data is collected via the Internet. Big data is higher than the rate at which the data type and the period of time for which data is collected depending on the size of data ...
Yoon-Su Jeong   +2 more
openalex   +3 more sources

An Ordered Universal Accumulator Based on a Hash Chain

open access: goldApplied Sciences
Cryptographic accumulators are now fundamental for secure applications across blockchain, IoT, and big data, powering anonymous credentials, streamlining key management, and enabling efficient data filtering.
Wenbao Jiang   +3 more
doaj   +2 more sources

Secure Authentication Protocol in Hadoop Distributed File System based on Hash Chain [PDF]

open access: bronzeConference on Information Security and Cryptology, 2013
The various types of data are being created in large quantities resulting from the spread of social media and the mobile popularization. Many companies want to obtain valuable business information through the analysis of these large data. As a result, it
So Won Jeong, Kee Sung Kim, Ik Rae Jeong
openalex   +2 more sources

P/Key: PUF based second factor authentication.

open access: yesPLoS ONE, 2023
One-time password (OTP) mechanisms are widely used to strengthen authentication processes. In time-based one-time password (TOTP) mechanisms, the client and server store common secrets.
Ertan Uysal, Mete Akgün
doaj   +2 more sources

Fast Counterfeit RFID Tags Detection With Slot Constraints

open access: yesIEEE Access, 2023
RFID tags are prone to counterfeit attacks in supply chain scenarios. The attacker often uses counterfeit tags to replace stolen tags to avoid being detected by the inventory process.
Bing Zhang, Xu Hu, Shan Gao
doaj   +1 more source

Blockchain for the circular economy: Theorizing blockchain's role in the transition to a circular economy through an empirical investigation

open access: yesBusiness Strategy and the Environment, Volume 31, Issue 8, Page 3786-3801, December 2022., 2022
Abstract Blockchain is increasingly lauded as an enabler of the transition to a circular economy. While there is considerable conceptual research and some empirical studies on this phenomenon, scholars have yet to develop a theoretical model of blockchain's role in this transition.
Moritz Böhmecke‐Schwafert   +2 more
wiley   +1 more source

Comparative Study and Analysis on Integrity of Data Files Using Different Tools and Techniques

open access: yesJournal of Information Security and Cybercrimes Research, 2021
Digital forensic investigation is the scientific process of collection, preservation, examination, analysis, documentation and presentation of digital evidence from digital devices, so that the evidence is in compliance with legal terms and acceptable in
Kumarshankar Raychaudhuri   +2 more
doaj   +1 more source

Oligonucleotides Featuring a Covalently Mercurated 6‐Phenylcarbazole Residue as High‐Affinity Hybridization Probes for Thiopyrimidine‐Containing Sequences

open access: yesChemistry – A European Journal, Volume 28, Issue 69, December 9, 2022., 2022
Getting back to (nucleo)base: Oligonucleotides incorporating a central 1‐ or 8‐mercuri‐6‐phenyl‐1H‐carbazole residue show great promise as high‐affinity hybridization probes, discriminating between all canonical nucleobases as well as 2‐ and 4‐thiothymines by melting temperature margins of at least 5 °C.
Tharun K. Kotammagari   +2 more
wiley   +1 more source

XOR Chain and Perfect Secrecy at the Dawn of the Quantum Era

open access: yesCryptography, 2023
In this article, we present a new method that achieves Shannon’s perfect secrecy. To achieve this property, we will introduce the triple XOR cancellation rule. The approach has two execution modes: digital signature and data encryption.
Luis Adrián Lizama-Pérez
doaj   +1 more source

Towards roadmap to implement blockchain in healthcare systems based on a maturity model

open access: yesJournal of Software: Evolution and Process, Volume 34, Issue 12, December 2022., 2022
This study presents a roadmap to develop a maturity model for blockchain in healthcare (MMBH) based on critical barriers (CBs), critical success factors (CSFs), and the best practices for blockchain implementation in healthcare systems. As a first step to develop the MMBH, in this paper, we present the initial results of a systematic literature review (
Muhammad Azeem Akbar   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy