Results 31 to 40 of about 72,170 (255)
A blockchain-based traceable and secure data-sharing scheme [PDF]
The traditional data-sharing model relies on a centralized third-party platform, which presents challenges such as poor transaction transparency and unsecured data security. In this article, we propose a blockchain-based traceable and secure data-sharing
Zhenqi Wang, Shaopeng Guan
doaj +2 more sources
Tree-Chain: A Fast Lightweight Consensus Algorithm for IoT Applications
Blockchain has received tremendous attention in non-monetary applications including the Internet of Things (IoT) due to its salient features including decentralization, security, auditability, and anonymity.
Dorri, Ali, Jurdak, Raja
core +1 more source
Reliable, Secure, and Efficient Hardware Implementation of Password Manager System Using SRAM PUF
Using Physical Unclonable Functions (PUFs) within the server-side has been recently proposed to address security vulnerabilities of the password (PW) authentication mechanism, including attacks on the database (DB) of user credentials.
Mohammad Mohammadinodoushan +4 more
doaj +1 more source
A Standalone FPGA-based Miner for Lyra2REv2 Cryptocurrencies
Lyra2REv2 is a hashing algorithm that consists of a chain of individual hashing algorithms, and it is used as a proof-of-work function in several cryptocurrencies.
Balatsoukas-Stimming, Alexios +4 more
core +2 more sources
Abstract The agri‐food supply chain has been a popular research topic in recent years. The combination of a demand for products of high quality and safety standards and the increasing number of stakeholders in supply chain networks has required the agri‐food business to transform from vertically integrated to vertically operated supply chain networks ...
Thanh_Tuan Chu, Thi Thu Tra Pham
wiley +1 more source
A blockchain architecture with master-slave blockchain
With the continuous development of blockchain technology, different chains are derived due to different adaptation scenarios.Each chain has its own characteristics, such as public chains like bitcoin and ethereum, a large number of private chains and ...
Pengliu TAN, Lixuran WAN
doaj +2 more sources
ARCHANGEL: Tamper-proofing Video Archives using Temporal Content Hashes on the Blockchain [PDF]
We present ARCHANGEL; a novel distributed ledger based system for assuring the long-term integrity of digital video archives. First, we describe a novel deep network architecture for computing compact temporal content hashes (TCHs) from audio-visual ...
Bell, Mark +10 more
core +2 more sources
Energy-Efficient Hash Chain Traversal
A hash chain H for a one-way hash function h(·) is a sequence of hash values , where vn is a secret value, vi is generated by vi=h(vi+1) for i=n-1,n-2,...,0 an0d v0 is a public value. A hash chain traversal algorithm T computes and outputs the hash chain H, returning vi in time period (called round) i for 1≤i≤n.
Yum, DH, Seo, JW, Lee, PJ
openaire +2 more sources
ClaimChain: Improving the Security and Privacy of In-band Key Distribution for Messaging [PDF]
The social demand for email end-to-end encryption is barely supported by mainstream service providers. Autocrypt is a new community-driven open specification for e-mail encryption that attempts to respond to this demand.
Chor Benny +13 more
core +2 more sources
On the Error Resilience of Ordered Binary Decision Diagrams [PDF]
Ordered Binary Decision Diagrams (OBDDs) are a data structure that is used in an increasing number of fields of Computer Science (e.g., logic synthesis, program verification, data mining, bioinformatics, and data protection) for representing and ...
Bernasconi, Anna +2 more
core +3 more sources

