Results 41 to 50 of about 2,377,005 (278)

Prototype of running clinical trials in an untrustworthy environment using blockchain. [PDF]

open access: yes, 2019
Monitoring and ensuring the integrity of data within the clinical trial process is currently not always feasible with the current research system.
Bhattacharya, Sanchita   +2 more
core   +3 more sources

A blockchain architecture with master-slave blockchain

open access: yes物联网学报, 2021
With the continuous development of blockchain technology, different chains are derived due to different adaptation scenarios.Each chain has its own characteristics, such as public chains like bitcoin and ethereum, a large number of private chains and ...
Pengliu TAN, Lixuran WAN
doaj   +2 more sources

Hasq Hash Chains

open access: yes, 2014
This paper describes a particular hash-based records linking chain scheme. This scheme is simple conceptually and easy to implement in software. It allows for a simple and secure way to transfer ownership of digital objects between peers.
Mazonka, Oleg, Popov, Vlad
openaire   +2 more sources

ClaimChain: Improving the Security and Privacy of In-band Key Distribution for Messaging [PDF]

open access: yes, 2018
The social demand for email end-to-end encryption is barely supported by mainstream service providers. Autocrypt is a new community-driven open specification for e-mail encryption that attempts to respond to this demand.
Chor Benny   +13 more
core   +2 more sources

Vertical coordination in agri‐food supply chain and blockchain: A proposed framework solution for Vietnamese cashew nut business

open access: yesRegional Science Policy &Practice, EarlyView., 2022
Abstract The agri‐food supply chain has been a popular research topic in recent years. The combination of a demand for products of high quality and safety standards and the increasing number of stakeholders in supply chain networks has required the agri‐food business to transform from vertically integrated to vertically operated supply chain networks ...
Thanh_Tuan Chu, Thi Thu Tra Pham
wiley   +1 more source

JAVASCRIPT SECURITY USING CRYPTOGRAPHIC HASH FUNCTIONS

open access: yesСучасні інформаційні системи, 2019
The subject of this research is the development of methods of protection against attacks on third-party JavaScript and the document object model (DOM).
Irada Rahimova   +3 more
doaj   +1 more source

JaxNet: Scalable Blockchain Network [PDF]

open access: yes, 2020
Today's world is organized based on merit and value. A single global currency that's decentralized is needed for a global economy. Bitcoin is a partial solution to this need, however it suffers from scalability problems which prevent it from being mass ...
Emelyanenko, Taras   +3 more
core   +1 more source

Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices [PDF]

open access: yes, 2011
Networks are evolving toward a ubiquitous model in which heterogeneous devices are interconnected. Cryptographic algorithms are required for developing security solutions that protect network activity. However, the computational and energy limitations
Herrera Joancomartí, Jordi   +1 more
core   +4 more sources

Key management scheme of distributed IoT devices based on blockchains

open access: yesIET Communications, 2023
With the rapid development of Internet of Things devices and communication technology, the number of devices connected to the Internet of Things is growing exponentially.
Qingyuan Liu   +5 more
doaj   +1 more source

Blockchain Processing Technique Based on Multiple Hash Chains for Minimizing Integrity Errors of IoT Data in Cloud Environments

open access: yesSensors, 2021
As IoT (Internet of Things) devices are diversified in the fields of use (manufacturing, health, medical, energy, home, automobile, transportation, etc.), it is becoming important to analyze and process data sent and received from IoT devices connected ...
Yoon-Su Jeong
doaj   +1 more source

Home - About - Disclaimer - Privacy