Results 71 to 80 of about 2,254,786 (237)
With the development of the Internet, numerous new applications have emerged, the features of which are constantly changing. It is necessary to perform application classification detection on the network traffic to monitor the changes in the applications.
Shichang Xuan+5 more
doaj +1 more source
Integrated Model of Image Protection Techniques
We propose an integrated model of Block-Permutation-Based Encryption (BPBE) and Reversible Data Hiding (RDH). The BPBE scheme involves four processes for encryption, namely block scrambling, block-rotation/inversion, negative-positive transformation and ...
Anu Aryal+3 more
doaj +1 more source
Enhanced trust management for building trustworthy social internet of things network
IoT devices may need to connect to unknown devices to realise ubiquitous computing in the 5G network and beyond. In such a situation, devices need to evaluate the trustworthiness of the other devices. A trust‐building model using a social network of IoT devices is discussed.
Swati Sucharita Roy+2 more
wiley +1 more source
Implementation of Node Authentication for WSN Using Hash Chains
AbstractThis paper presents the design and implementation of a lightweight node authentication protocol which comprises of node registration, node authentication and key establishment phases. The solution leverages the low computational overheads associated with cryptographically secure one-way hash chains and Elliptical Curve Crytography (ECC) without
Ayaz Hassan Moon+2 more
openaire +2 more sources
Digital signatures over HMAC entangled chains
In this work we present a new digital signature method based on hash chains and the hash message authentication code (HMAC). Unlike Blockchain technology, our approach establishes that the database of transactions is distributed among users, so each one ...
Luis Adrián Lizama-Pérez
doaj
Functional Graphs and Their Applications in Generic Attacks on Iterated Hash Constructions
We provide a survey about generic attacks on cryptographic hash constructions including hash-based message authentication codes and hash combiners. We look into attacks involving iteratively evaluating identical mappings many times.
Zhenzhen Bao, Jian Guo, Lei Wang
doaj +1 more source
Generalized Hash Chain Traversal with Selective Output
A hash chain H for a one-way hash function h(·) is a sequence of hash values , where v0 is a public value, vn a secret value, and vi =h(vi+1). A hash chain traversal algorithm T computes and outputs the hash chain H, returning vi in time period (called round) i for 1 ≤ i ≤ n.
Yum, DH, Seo, JW, Cho, K, Lee, PJ
openaire +4 more sources
Abstract This study explores the practical impact of blockchain technology (BCT), which contrasts strongly with literature that has predominantly hypothesised BCT's potential to disrupt accounting practice. We interviewed 44 practitioners and academics with knowledge of BCT across 13 countries and industries.
Musbaudeen Titilope Oladejo+3 more
wiley +1 more source
3DGS.zip: A survey on 3D Gaussian Splatting Compression Methods
Abstract 3D Gaussian Splatting (3DGS) has emerged as a cutting‐edge technique for real‐time radiance field rendering, offering state‐of‐the‐art performance in terms of both quality and speed. 3DGS models a scene as a collection of three‐dimensional Gaussians, with additional attributes optimized to conform to the scene's geometric and visual properties.
M. T. Bagdasarian+6 more
wiley +1 more source
Review on cross-chain technology research of blockchains
With the in-depth development and continuous innovation of blockchain technology, blockchain networks suitable for different application scenarios and design requirements have emerged as the times require, the mutual independence of blockchains ...
Chuannian SHEN
doaj +2 more sources