Results 41 to 50 of about 2,254,786 (237)

A blockchain architecture with master-slave blockchain

open access: yes物联网学报, 2021
With the continuous development of blockchain technology, different chains are derived due to different adaptation scenarios.Each chain has its own characteristics, such as public chains like bitcoin and ethereum, a large number of private chains and ...
Pengliu TAN, Lixuran WAN
doaj   +2 more sources

Key management scheme of distributed IoT devices based on blockchains

open access: yesIET Communications, 2023
With the rapid development of Internet of Things devices and communication technology, the number of devices connected to the Internet of Things is growing exponentially.
Qingyuan Liu   +5 more
doaj   +1 more source

Vertical coordination in agri‐food supply chain and blockchain: A proposed framework solution for Vietnamese cashew nut business

open access: yesRegional Science Policy &Practice, EarlyView., 2022
Abstract The agri‐food supply chain has been a popular research topic in recent years. The combination of a demand for products of high quality and safety standards and the increasing number of stakeholders in supply chain networks has required the agri‐food business to transform from vertically integrated to vertically operated supply chain networks ...
Thanh_Tuan Chu, Thi Thu Tra Pham
wiley   +1 more source

An Efficient Two-Factor Authentication Scheme Based on the Merkle Tree

open access: yesSensors, 2020
The Time-based One-Time Password (TOTP) algorithm is commonly used for two-factor authentication. In this algorithm, a shared secret is used to derive a One-Time Password (OTP). However, in TOTP, the client and the server need to agree on a shared secret
Xinming Yin   +5 more
doaj   +1 more source

Hasq Hash Chains

open access: yes, 2014
This paper describes a particular hash-based records linking chain scheme. This scheme is simple conceptually and easy to implement in software. It allows for a simple and secure way to transfer ownership of digital objects between peers.
Mazonka, Oleg, Popov, Vlad
openaire   +2 more sources

Secure big data collection and processing: Framework, means and opportunities

open access: yesJournal of the Royal Statistical Society: Series A (Statistics in Society), Volume 185, Issue 4, Page 1541-1559, October 2022., 2022
Abstract Statistical disclosure control is important for the dissemination of statistical outputs. There is an increasing need for greater confidentiality protection during data collection and processing by National Statistical Offices. In particular, various transactions and remote sensing signals are examples of useful but very detailed big data that
Li‐Chun Zhang, Gustav Haraldsen
wiley   +1 more source

JAVASCRIPT SECURITY USING CRYPTOGRAPHIC HASH FUNCTIONS

open access: yesСучасні інформаційні системи, 2019
The subject of this research is the development of methods of protection against attacks on third-party JavaScript and the document object model (DOM).
Irada Rahimova   +3 more
doaj   +1 more source

Reliable, Secure, and Efficient Hardware Implementation of Password Manager System Using SRAM PUF

open access: yesIEEE Access, 2021
Using Physical Unclonable Functions (PUFs) within the server-side has been recently proposed to address security vulnerabilities of the password (PW) authentication mechanism, including attacks on the database (DB) of user credentials.
Mohammad Mohammadinodoushan   +4 more
doaj   +1 more source

Covert Channels in One-Time Passwords Based on Hash Chains [PDF]

open access: yesProceedings of the European Interdisciplinary Cybersecurity Conference, 2020
We present a covert channel between two network devices where one authenticates itself with Lamport's one-time passwords based on a cryptographic hash function. Our channel enables plausible deniability. We also present countermeasures to detect the presence of such a covert channel, which are non-trivial because hash values are randomly looking binary
Keller, Jörg, Wendzel, Steffen
openaire   +3 more sources

Novel self-renewal hash chain scheme based on (t,n) threshold and division tree

open access: yesTongxin xuebao, 2013
The introduction of renewal hash chain overcame resource-constrained defect in traditional hash chains,but the existing renewable schemes had still held unsatisfactory performance especially on security and complexity.The definitions of repetition ...
Hai-ping HUANG   +4 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy