Results 1 to 10 of about 91,430 (177)

Blockchain Processing Technique Based on Multiple Hash Chains for Minimizing Integrity Errors of IoT Data in Cloud Environments. [PDF]

open access: yesSensors (Basel), 2021
As IoT (Internet of Things) devices are diversified in the fields of use (manufacturing, health, medical, energy, home, automobile, transportation, etc.), it is becoming important to analyze and process data sent and received from IoT devices connected ...
Jeong YS.
europepmc   +2 more sources

Hasq Hash Chains [PDF]

open access: yesarXiv, 2014
This paper describes a particular hash-based records linking chain scheme. This scheme is simple conceptually and easy to implement in software. It allows for a simple and secure way to transfer ownership of digital objects between peers.
Mazonka, Oleg, Popov, Vlad
openaire   +3 more sources

Permutation-Based Hash Chains with Application to Password Hashing [PDF]

open access: yesIACR Transactions on Symmetric Cryptology
Hash chain based password systems are a useful way to guarantee authentication with one-time passwords. The core idea dates back to Lamport, and is specified in RFC 1760 as S/Key. At CCS 2017, Kogan et al. introduced T/Key, an improved password system where one-time passwords are only valid for a limited time period.
Lefevre, Charlotte, Mennink, Bart
openaire   +4 more sources

Separate Chaining Meets Compact Hashing [PDF]

open access: yesarXiv, 2019
Preprint of the local proceedings of the 173th SIGAL ...
openaire   +3 more sources

Enhanced efficiency and security in cross-chain transmission of blockchain internet of ports through multi-feature-based joint learning. [PDF]

open access: yesSci Rep
The rapid development of Blockchain Internet of Things (IoT) has intensified the need for efficient and secure cross-chain transmission across heterogeneous systems.
Xie Z, Zhang X, Liu X.
europepmc   +2 more sources

Dynamic Cryptography Integrated Secured Decentralized Applications with Blockchain Programming

open access: yesWasit Journal of Computer and Mathematics Science, 2022
Blocks and chains are the building blocks of the blockchain, which is a community network. Blocks and chains are two terms used to describe collections of data information.
Jamal Kh-Madhloom
doaj   +1 more source

A blockchain-based lightweight identity authentication scheme for the IEDs of security and stability control system.

open access: yesPLoS ONE, 2022
As an important part of the second defense line of the power system, the Security and Stability Control System (SSCS) is of great significance to ensure the reliable operation of the power system. However, SSCS still lacks an effective security mechanism
Zhaohan Li   +5 more
doaj   +1 more source

Reversible and Plausibly Deniable Covert Channels in One-Time Passwords Based on Hash Chains

open access: yesApplied Sciences, 2021
Covert channels enable stealthy communications over innocent appearing carriers. They are increasingly applied in the network context. However, little work is available that exploits cryptographic primitives in the networking context to establish such ...
Jörg Keller, Steffen Wendzel
doaj   +1 more source

Inductive Learning of OWL 2 Property Chains

open access: yesIEEE Access, 2022
We present an algorithm to inductively learn Web Ontology Language (OWL) 2 property chains to be used in object subproperty axioms. For efficiency, it uses specialized encodings and data structures based on hash-maps and sparse matrices. The algorithm is
Jedrzej Potoniec
doaj   +1 more source

An Anonymous Authentication Scheme Based on Chinese Residue Theorem in Wireless Body Area Networks

open access: yesMathematics, 2023
Considering the resource limitations of low-cost wireless sensors, there is a growing inclination to utilize cryptographic primitives that are optimized for efficiency, such as symmetric key encryption/decryption and hash functions, when designing ...
Jian Zhong   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy