Results 41 to 50 of about 70,639 (257)
A blockchain architecture with master-slave blockchain
With the continuous development of blockchain technology, different chains are derived due to different adaptation scenarios.Each chain has its own characteristics, such as public chains like bitcoin and ethereum, a large number of private chains and ...
Pengliu TAN, Lixuran WAN
doaj +2 more sources
Proof of Luck: an Efficient Blockchain Consensus Protocol [PDF]
In the paper, we present designs for multiple blockchain consensus primitives and a novel blockchain system, all based on the use of trusted execution environments (TEEs), such as Intel SGX-enabled CPUs.
Castro M. +4 more
core +2 more sources
JAVASCRIPT SECURITY USING CRYPTOGRAPHIC HASH FUNCTIONS
The subject of this research is the development of methods of protection against attacks on third-party JavaScript and the document object model (DOM).
Irada Rahimova +3 more
doaj +1 more source
An Efficient Two-Factor Authentication Scheme Based on the Merkle Tree
The Time-based One-Time Password (TOTP) algorithm is commonly used for two-factor authentication. In this algorithm, a shared secret is used to derive a One-Time Password (OTP). However, in TOTP, the client and the server need to agree on a shared secret
Xinming Yin +5 more
doaj +1 more source
As IoT (Internet of Things) devices are diversified in the fields of use (manufacturing, health, medical, energy, home, automobile, transportation, etc.), it is becoming important to analyze and process data sent and received from IoT devices connected ...
Yoon-Su Jeong
doaj +1 more source
A Fair and Secure Cluster Formation Process for Ad Hoc Networks [PDF]
An efficient approach for organizing large ad hoc networks is to divide the nodes into multiple clusters and designate, for each cluster, a clusterhead which is responsible for holding intercluster control information. The role of a clusterhead entails
H. Rifà-Pous +6 more
core +1 more source
Reliable, Secure, and Efficient Hardware Implementation of Password Manager System Using SRAM PUF
Using Physical Unclonable Functions (PUFs) within the server-side has been recently proposed to address security vulnerabilities of the password (PW) authentication mechanism, including attacks on the database (DB) of user credentials.
Mohammad Mohammadinodoushan +4 more
doaj +1 more source
On the Error Resilience of Ordered Binary Decision Diagrams [PDF]
Ordered Binary Decision Diagrams (OBDDs) are a data structure that is used in an increasing number of fields of Computer Science (e.g., logic synthesis, program verification, data mining, bioinformatics, and data protection) for representing and ...
Bernasconi, Anna +2 more
core +3 more sources
Novel self-renewal hash chain scheme based on (t,n) threshold and division tree
The introduction of renewal hash chain overcame resource-constrained defect in traditional hash chains,but the existing renewable schemes had still held unsatisfactory performance especially on security and complexity.The definitions of repetition ...
Hai-ping HUANG +4 more
doaj +2 more sources
Key management scheme of distributed IoT devices based on blockchains
With the rapid development of Internet of Things devices and communication technology, the number of devices connected to the Internet of Things is growing exponentially.
Qingyuan Liu +5 more
doaj +1 more source

