Results 61 to 70 of about 72,170 (255)

A Mobile-Oriented System for Integrity Preserving in Audio Forensics

open access: yesApplied Sciences, 2019
This paper addresses a problem in the field of audio forensics. With the aim of providing a solution that helps Chain of Custody (CoC) processes, we propose an integrity verification system that includes capture (mobile based), hash code calculation and ...
Diego Renza   +2 more
doaj   +1 more source

An Efficient Two-Factor Authentication Scheme Based on the Merkle Tree

open access: yesSensors, 2020
The Time-based One-Time Password (TOTP) algorithm is commonly used for two-factor authentication. In this algorithm, a shared secret is used to derive a One-Time Password (OTP). However, in TOTP, the client and the server need to agree on a shared secret
Xinming Yin   +5 more
doaj   +1 more source

Fair micropayment system based on hash chains

open access: yesTsinghua Science and Technology, 2005
Micropayment schemes usually do not provide fairness, which means that either the customer or the merchant, or both, can cheat each other and gain a financial advantage by misusing the protocols. This paper proposes an efficient hash chain-based micropayment scheme, which is an offline, prepaid scheme that supports simpler divisibility of digital coins.
Zongkai Yang, Weimin Lang, Yunmeng Tan
openaire   +1 more source

Hyperledger Fabric for the (digitalized) lifecycle of construction products: Applied review on fastening technology

open access: yesCivil Engineering Design, Volume 7, Issue 1, Page 9-22, March 2025.
Abstract Blockchain technology is a digital decentralized data ledger recording transactions in an encrypted format. Its implementation can potentially hold significant advantages for the built environment, particularly in manufacturing and building product usage aligned with Building Information Modeling (BIM). This paradigm shift toward decentralized
Aileen Pfeil   +2 more
wiley   +1 more source

Atomic and privacy-preserving cyclic cross-chain protocol based on chameleon hash function

open access: yesBlockchain: Research and Applications
Blockchain-based digital assets have increasingly emerged in recent years, necessitating cross-chain swaps. Hash Time-Lock Contract (HTLC) is a widely used protocol for such swaps; however, simple hash time locks can allow attackers to analyze ...
Mengyan Li, Maoning Wang, Meijiao Duan
doaj   +1 more source

Integrated Model of Image Protection Techniques

open access: yesJournal of Imaging, 2017
We propose an integrated model of Block-Permutation-Based Encryption (BPBE) and Reversible Data Hiding (RDH). The BPBE scheme involves four processes for encryption, namely block scrambling, block-rotation/inversion, negative-positive transformation and ...
Anu Aryal   +3 more
doaj   +1 more source

Secure spontaneous emergency access to personal health record [PDF]

open access: yes, 2011
We propose a system which enables access to the user's Personal Health Record (PHR) in the event of emergency. The access typically occurs in an ad-hoc and spontaneous manner and the user is usually unconscious, hence rendering the unavailability of ...
Asim, M.   +3 more
core  

Encrypted data inquiries using chained perfect hashing (CPH) [PDF]

open access: yesAIP Conference Proceedings, 2017
Cryptography is the practice of transforming data to indecipherable by a third party, unless a particular piece of secret information is made available to them. Data encryption has been paid a great attention to protect data. As data sizes are growing, so does the need for efficient data search while being encrypted to protect it during transmission ...
Khalid Kaabneh   +2 more
openaire   +1 more source

ParaHox Genes Revisited: From Gut Patterning to Integrated Axial and Neural Organization in Rotifera

open access: yesJournal of Experimental Zoology Part B: Molecular and Developmental Evolution, EarlyView.
In rotifers, ParaHox genes show a dispersed genomic organization, with Xlox absent across gnathiferans. Exclusive neuronal expression of Gsx and Cdx reveals that ancestral ParaHox genes coordinated neural and epithelial development beyond gut patterning, suggesting an integrated role in early bilaterian body plan organization.
Andreas C. Fröbius   +2 more
wiley   +1 more source

From Expectations to Experience: A Comparison of Program Director Priorities to Resident Case Logs

open access: yesThe Laryngoscope, EarlyView.
The present study identified 47 essential otolaryngology procedures via program director surveys and evaluated the extent of resident participation in these cases through ACGME case logs. Results revealed significant variability in surgical experience, with nearly half of these essential procedures being logged fewer than 10 times during residency ...
Taylor S. Erickson   +7 more
wiley   +1 more source

Home - About - Disclaimer - Privacy