Results 61 to 70 of about 72,170 (255)
A Mobile-Oriented System for Integrity Preserving in Audio Forensics
This paper addresses a problem in the field of audio forensics. With the aim of providing a solution that helps Chain of Custody (CoC) processes, we propose an integrity verification system that includes capture (mobile based), hash code calculation and ...
Diego Renza +2 more
doaj +1 more source
An Efficient Two-Factor Authentication Scheme Based on the Merkle Tree
The Time-based One-Time Password (TOTP) algorithm is commonly used for two-factor authentication. In this algorithm, a shared secret is used to derive a One-Time Password (OTP). However, in TOTP, the client and the server need to agree on a shared secret
Xinming Yin +5 more
doaj +1 more source
Fair micropayment system based on hash chains
Micropayment schemes usually do not provide fairness, which means that either the customer or the merchant, or both, can cheat each other and gain a financial advantage by misusing the protocols. This paper proposes an efficient hash chain-based micropayment scheme, which is an offline, prepaid scheme that supports simpler divisibility of digital coins.
Zongkai Yang, Weimin Lang, Yunmeng Tan
openaire +1 more source
Abstract Blockchain technology is a digital decentralized data ledger recording transactions in an encrypted format. Its implementation can potentially hold significant advantages for the built environment, particularly in manufacturing and building product usage aligned with Building Information Modeling (BIM). This paradigm shift toward decentralized
Aileen Pfeil +2 more
wiley +1 more source
Atomic and privacy-preserving cyclic cross-chain protocol based on chameleon hash function
Blockchain-based digital assets have increasingly emerged in recent years, necessitating cross-chain swaps. Hash Time-Lock Contract (HTLC) is a widely used protocol for such swaps; however, simple hash time locks can allow attackers to analyze ...
Mengyan Li, Maoning Wang, Meijiao Duan
doaj +1 more source
Integrated Model of Image Protection Techniques
We propose an integrated model of Block-Permutation-Based Encryption (BPBE) and Reversible Data Hiding (RDH). The BPBE scheme involves four processes for encryption, namely block scrambling, block-rotation/inversion, negative-positive transformation and ...
Anu Aryal +3 more
doaj +1 more source
Secure spontaneous emergency access to personal health record [PDF]
We propose a system which enables access to the user's Personal Health Record (PHR) in the event of emergency. The access typically occurs in an ad-hoc and spontaneous manner and the user is usually unconscious, hence rendering the unavailability of ...
Asim, M. +3 more
core
Encrypted data inquiries using chained perfect hashing (CPH) [PDF]
Cryptography is the practice of transforming data to indecipherable by a third party, unless a particular piece of secret information is made available to them. Data encryption has been paid a great attention to protect data. As data sizes are growing, so does the need for efficient data search while being encrypted to protect it during transmission ...
Khalid Kaabneh +2 more
openaire +1 more source
ParaHox Genes Revisited: From Gut Patterning to Integrated Axial and Neural Organization in Rotifera
In rotifers, ParaHox genes show a dispersed genomic organization, with Xlox absent across gnathiferans. Exclusive neuronal expression of Gsx and Cdx reveals that ancestral ParaHox genes coordinated neural and epithelial development beyond gut patterning, suggesting an integrated role in early bilaterian body plan organization.
Andreas C. Fröbius +2 more
wiley +1 more source
From Expectations to Experience: A Comparison of Program Director Priorities to Resident Case Logs
The present study identified 47 essential otolaryngology procedures via program director surveys and evaluated the extent of resident participation in these cases through ACGME case logs. Results revealed significant variability in surgical experience, with nearly half of these essential procedures being logged fewer than 10 times during residency ...
Taylor S. Erickson +7 more
wiley +1 more source

