Results 1 to 10 of about 32,420 (268)

Blockchain Processing Technique Based on Multiple Hash Chains for Minimizing Integrity Errors of IoT Data in Cloud Environments [PDF]

open access: yesSensors, 2021
As IoT (Internet of Things) devices are diversified in the fields of use (manufacturing, health, medical, energy, home, automobile, transportation, etc.), it is becoming important to analyze and process data sent and received from IoT devices connected ...
Yoon-Su Jeong
doaj   +2 more sources

Reversible and Plausibly Deniable Covert Channels in One-Time Passwords Based on Hash Chains [PDF]

open access: goldApplied Sciences, 2021
Covert channels enable stealthy communications over innocent appearing carriers. They are increasingly applied in the network context. However, little work is available that exploits cryptographic primitives in the networking context to establish such ...
Jörg Keller, Steffen Wendzel
doaj   +2 more sources

Novel Hash-time-lock-contract Based Cross-chain Token Swap Mechanism of Blockchain [PDF]

open access: greenJisuanji kexue, 2022
Blockchain is one of the technical hotspots in recent years,and the research theories related to it are being enriched.However,it is still facing the key problem of small throughput and low processing efficiency before it can be implemented into the ...
LIU Feng, ZHANG Jia-hao, ZHOU Jun-jie, LI Mu, KONG De-li, YANG Jie, QI Jia-yin, ZHOU Ai-min
doaj   +2 more sources

RiceChain-Plus: an enhanced framework for blockchain-based rice supply chain systems-ensuring security, privacy, and efficiency [PDF]

open access: yesPeerJ Computer Science
The rice supply chain is a complex system that demands effective management to ensure reliability and efficiency, given the involvement of multiple stakeholders.
Bello Musa Yakubu   +2 more
doaj   +3 more sources

Digital signatures over HMAC entangled chains

open access: yesEngineering Science and Technology, an International Journal, 2022
In this work we present a new digital signature method based on hash chains and the hash message authentication code (HMAC). Unlike Blockchain technology, our approach establishes that the database of transactions is distributed among users, so each one ...
Luis Adrián Lizama-Pérez
doaj   +1 more source

Dynamic Cryptography Integrated Secured Decentralized Applications with Blockchain Programming

open access: yesWasit Journal of Computer and Mathematics Science, 2022
Blocks and chains are the building blocks of the blockchain, which is a community network. Blocks and chains are two terms used to describe collections of data information.
Jamal Kh-Madhloom
doaj   +1 more source

A blockchain-based lightweight identity authentication scheme for the IEDs of security and stability control system.

open access: yesPLoS ONE, 2022
As an important part of the second defense line of the power system, the Security and Stability Control System (SSCS) is of great significance to ensure the reliable operation of the power system. However, SSCS still lacks an effective security mechanism
Zhaohan Li   +5 more
doaj   +1 more source

Inductive Learning of OWL 2 Property Chains

open access: yesIEEE Access, 2022
We present an algorithm to inductively learn Web Ontology Language (OWL) 2 property chains to be used in object subproperty axioms. For efficiency, it uses specialized encodings and data structures based on hash-maps and sparse matrices. The algorithm is
Jedrzej Potoniec
doaj   +1 more source

An Anonymous Authentication Scheme Based on Chinese Residue Theorem in Wireless Body Area Networks

open access: yesMathematics, 2023
Considering the resource limitations of low-cost wireless sensors, there is a growing inclination to utilize cryptographic primitives that are optimized for efficiency, such as symmetric key encryption/decryption and hash functions, when designing ...
Jian Zhong   +4 more
doaj   +1 more source

A blockchain architecture with master-slave blockchain

open access: yes物联网学报, 2021
With the continuous development of blockchain technology, different chains are derived due to different adaptation scenarios.Each chain has its own characteristics, such as public chains like bitcoin and ethereum, a large number of private chains and ...
Pengliu TAN, Lixuran WAN
doaj   +2 more sources

Home - About - Disclaimer - Privacy