Results 1 to 10 of about 91,430 (177)
Blockchain Processing Technique Based on Multiple Hash Chains for Minimizing Integrity Errors of IoT Data in Cloud Environments. [PDF]
As IoT (Internet of Things) devices are diversified in the fields of use (manufacturing, health, medical, energy, home, automobile, transportation, etc.), it is becoming important to analyze and process data sent and received from IoT devices connected ...
Jeong YS.
europepmc +2 more sources
This paper describes a particular hash-based records linking chain scheme. This scheme is simple conceptually and easy to implement in software. It allows for a simple and secure way to transfer ownership of digital objects between peers.
Mazonka, Oleg, Popov, Vlad
openaire +3 more sources
Permutation-Based Hash Chains with Application to Password Hashing [PDF]
Hash chain based password systems are a useful way to guarantee authentication with one-time passwords. The core idea dates back to Lamport, and is specified in RFC 1760 as S/Key. At CCS 2017, Kogan et al. introduced T/Key, an improved password system where one-time passwords are only valid for a limited time period.
Lefevre, Charlotte, Mennink, Bart
openaire +4 more sources
Separate Chaining Meets Compact Hashing [PDF]
Preprint of the local proceedings of the 173th SIGAL ...
openaire +3 more sources
Enhanced efficiency and security in cross-chain transmission of blockchain internet of ports through multi-feature-based joint learning. [PDF]
The rapid development of Blockchain Internet of Things (IoT) has intensified the need for efficient and secure cross-chain transmission across heterogeneous systems.
Xie Z, Zhang X, Liu X.
europepmc +2 more sources
Dynamic Cryptography Integrated Secured Decentralized Applications with Blockchain Programming
Blocks and chains are the building blocks of the blockchain, which is a community network. Blocks and chains are two terms used to describe collections of data information.
Jamal Kh-Madhloom
doaj +1 more source
As an important part of the second defense line of the power system, the Security and Stability Control System (SSCS) is of great significance to ensure the reliable operation of the power system. However, SSCS still lacks an effective security mechanism
Zhaohan Li+5 more
doaj +1 more source
Reversible and Plausibly Deniable Covert Channels in One-Time Passwords Based on Hash Chains
Covert channels enable stealthy communications over innocent appearing carriers. They are increasingly applied in the network context. However, little work is available that exploits cryptographic primitives in the networking context to establish such ...
Jörg Keller, Steffen Wendzel
doaj +1 more source
Inductive Learning of OWL 2 Property Chains
We present an algorithm to inductively learn Web Ontology Language (OWL) 2 property chains to be used in object subproperty axioms. For efficiency, it uses specialized encodings and data structures based on hash-maps and sparse matrices. The algorithm is
Jedrzej Potoniec
doaj +1 more source
An Anonymous Authentication Scheme Based on Chinese Residue Theorem in Wireless Body Area Networks
Considering the resource limitations of low-cost wireless sensors, there is a growing inclination to utilize cryptographic primitives that are optimized for efficiency, such as symmetric key encryption/decryption and hash functions, when designing ...
Jian Zhong+4 more
doaj +1 more source