Results 41 to 50 of about 72,170 (255)

JAVASCRIPT SECURITY USING CRYPTOGRAPHIC HASH FUNCTIONS

open access: yesСучасні інформаційні системи, 2019
The subject of this research is the development of methods of protection against attacks on third-party JavaScript and the document object model (DOM).
Irada Rahimova   +3 more
doaj   +1 more source

Linear Hashing is Awesome

open access: yes, 2016
We consider the hash function $h(x) = ((ax+b) \bmod p) \bmod n$ where $a,b$ are chosen uniformly at random from $\{0,1,\ldots,p-1\}$. We prove that when we use $h(x)$ in hashing with chaining to insert $n$ elements into a table of size $n$ the expected ...
Knudsen, Mathias Bæk Tejs
core   +1 more source

An Analysis and Enumeration of the Blockchain and Future Implications [PDF]

open access: yes, 2020
The blockchain is a relatively new technology that has grown in interest and potential research since its inception. Blockchain technology is dominated by cryptocurrency in terms of usage.
LeBlanc, Nathanial
core   +1 more source

Decentralized Trusted Timestamping using the Crypto Currency Bitcoin

open access: yes, 2015
Trusted timestamping is a process for proving that certain information existed at a given point in time. This paper presents a trusted timestamping concept and its implementation in form of a web-based service that uses the decentralized Bitcoin block ...
Gernandt, André   +2 more
core   +2 more sources

Novel self-renewal hash chain scheme based on (t,n) threshold and division tree

open access: yesTongxin xuebao, 2013
The introduction of renewal hash chain overcame resource-constrained defect in traditional hash chains,but the existing renewable schemes had still held unsatisfactory performance especially on security and complexity.The definitions of repetition ...
Hai-ping HUANG   +4 more
doaj   +2 more sources

Key management scheme of distributed IoT devices based on blockchains

open access: yesIET Communications, 2023
With the rapid development of Internet of Things devices and communication technology, the number of devices connected to the Internet of Things is growing exponentially.
Qingyuan Liu   +5 more
doaj   +1 more source

KALwEN: a new practical and interoperable key management scheme for body sensor networks [PDF]

open access: yes, 2010
Key management is the pillar of a security architecture. Body sensor networks (BSNs) pose several challenges–some inherited from wireless sensor networks (WSNs), some unique to themselves–that require a new key management scheme to be tailor-made.
Gong, Zheng   +4 more
core   +3 more sources

Bottom‐Up Programming of Cell States in Cancer Organoids with Defined Synthetic Adhesion Cues

open access: yesAdvanced Materials, EarlyView.
A bottom‐up biomaterial platform is developed to program transcriptomic states in pancreatic cancer organoids by tuning adhesion cues within synthetic matrices. By combining a Design of Experiments framework with multiobjective optimization, matrix compositions are identified that enrich specific cellular programs like EMT.
Ali Nadernezhad   +6 more
wiley   +1 more source

Improved One-Way Hash Chain and Revocation Polynomial-Based Self-Healing Group Key Distribution Schemes in Resource-Constrained Wireless Networks

open access: yesSensors, 2014
Self-healing group key distribution (SGKD) aims to deal with the key distribution problem over an unreliable wireless network. In this paper, we investigate the SGKD issue in resource-constrained wireless networks.
Huifang Chen, Lei Xie
doaj   +1 more source

Digital signatures over hash-entangled chains [PDF]

open access: yesSN Applied Sciences, 2019
In this work we introduce a new approach for digital signature based on hash chains. The method is supported on the well known security principles of hash functions. Some main advantages of this public key system include security and estimated efficiency through the so called signature chains.
openaire   +1 more source

Home - About - Disclaimer - Privacy