Results 31 to 40 of about 7,578 (241)

A blockchain-based traceable and secure data-sharing scheme [PDF]

open access: yesPeerJ Computer Science, 2023
The traditional data-sharing model relies on a centralized third-party platform, which presents challenges such as poor transaction transparency and unsecured data security. In this article, we propose a blockchain-based traceable and secure data-sharing
Zhenqi Wang, Shaopeng Guan
doaj   +2 more sources

Reliable, Secure, and Efficient Hardware Implementation of Password Manager System Using SRAM PUF

open access: yesIEEE Access, 2021
Using Physical Unclonable Functions (PUFs) within the server-side has been recently proposed to address security vulnerabilities of the password (PW) authentication mechanism, including attacks on the database (DB) of user credentials.
Mohammad Mohammadinodoushan   +4 more
doaj   +1 more source

A blockchain architecture with master-slave blockchain

open access: yes物联网学报, 2021
With the continuous development of blockchain technology, different chains are derived due to different adaptation scenarios.Each chain has its own characteristics, such as public chains like bitcoin and ethereum, a large number of private chains and ...
Pengliu TAN, Lixuran WAN
doaj   +2 more sources

Blockchain Processing Technique Based on Multiple Hash Chains for Minimizing Integrity Errors of IoT Data in Cloud Environments

open access: yesSensors, 2021
As IoT (Internet of Things) devices are diversified in the fields of use (manufacturing, health, medical, energy, home, automobile, transportation, etc.), it is becoming important to analyze and process data sent and received from IoT devices connected ...
Yoon-Su Jeong
doaj   +1 more source

JAVASCRIPT SECURITY USING CRYPTOGRAPHIC HASH FUNCTIONS

open access: yesСучасні інформаційні системи, 2019
The subject of this research is the development of methods of protection against attacks on third-party JavaScript and the document object model (DOM).
Irada Rahimova   +3 more
doaj   +1 more source

An Efficient Two-Factor Authentication Scheme Based on the Merkle Tree

open access: yesSensors, 2020
The Time-based One-Time Password (TOTP) algorithm is commonly used for two-factor authentication. In this algorithm, a shared secret is used to derive a One-Time Password (OTP). However, in TOTP, the client and the server need to agree on a shared secret
Xinming Yin   +5 more
doaj   +1 more source

Novel self-renewal hash chain scheme based on (t,n) threshold and division tree

open access: yesTongxin xuebao, 2013
The introduction of renewal hash chain overcame resource-constrained defect in traditional hash chains,but the existing renewable schemes had still held unsatisfactory performance especially on security and complexity.The definitions of repetition ...
Hai-ping HUANG   +4 more
doaj   +2 more sources

Improved One-Way Hash Chain and Revocation Polynomial-Based Self-Healing Group Key Distribution Schemes in Resource-Constrained Wireless Networks

open access: yesSensors, 2014
Self-healing group key distribution (SGKD) aims to deal with the key distribution problem over an unreliable wireless network. In this paper, we investigate the SGKD issue in resource-constrained wireless networks.
Huifang Chen, Lei Xie
doaj   +1 more source

Key management scheme of distributed IoT devices based on blockchains

open access: yesIET Communications, 2023
With the rapid development of Internet of Things devices and communication technology, the number of devices connected to the Internet of Things is growing exponentially.
Qingyuan Liu   +5 more
doaj   +1 more source

A Water‐Soluble PVA Macrothiol Enables Two‐Photon Microfabrication of Cell‐Interactive Hydrogel Structures at 400 mm s−1

open access: yesAdvanced Materials, EarlyView.
A PVA‐based macromolecular thiol‐ene formulation enables efficient two‐photon polymerization at extremely low polymer concentrations and high writing speeds of 400 mm s−1 (20×), allowing high‐fidelity laser writing of cell‐interactive hydrogel structures on demand.
Wanwan Qiu   +6 more
wiley   +1 more source

Home - About - Disclaimer - Privacy