Blockchain Processing Technique Based on Multiple Hash Chains for Minimizing Integrity Errors of IoT Data in Cloud Environments [PDF]
As IoT (Internet of Things) devices are diversified in the fields of use (manufacturing, health, medical, energy, home, automobile, transportation, etc.), it is becoming important to analyze and process data sent and received from IoT devices connected ...
Yoon-Su Jeong
doaj +2 more sources
Reversible and Plausibly Deniable Covert Channels in One-Time Passwords Based on Hash Chains [PDF]
Covert channels enable stealthy communications over innocent appearing carriers. They are increasingly applied in the network context. However, little work is available that exploits cryptographic primitives in the networking context to establish such ...
Jörg Keller, Steffen Wendzel
doaj +2 more sources
Novel Hash-time-lock-contract Based Cross-chain Token Swap Mechanism of Blockchain [PDF]
Blockchain is one of the technical hotspots in recent years,and the research theories related to it are being enriched.However,it is still facing the key problem of small throughput and low processing efficiency before it can be implemented into the ...
LIU Feng, ZHANG Jia-hao, ZHOU Jun-jie, LI Mu, KONG De-li, YANG Jie, QI Jia-yin, ZHOU Ai-min
doaj +2 more sources
RiceChain-Plus: an enhanced framework for blockchain-based rice supply chain systems-ensuring security, privacy, and efficiency [PDF]
The rice supply chain is a complex system that demands effective management to ensure reliability and efficiency, given the involvement of multiple stakeholders.
Bello Musa Yakubu +2 more
doaj +3 more sources
Digital signatures over HMAC entangled chains
In this work we present a new digital signature method based on hash chains and the hash message authentication code (HMAC). Unlike Blockchain technology, our approach establishes that the database of transactions is distributed among users, so each one ...
Luis Adrián Lizama-Pérez
doaj +1 more source
Dynamic Cryptography Integrated Secured Decentralized Applications with Blockchain Programming
Blocks and chains are the building blocks of the blockchain, which is a community network. Blocks and chains are two terms used to describe collections of data information.
Jamal Kh-Madhloom
doaj +1 more source
As an important part of the second defense line of the power system, the Security and Stability Control System (SSCS) is of great significance to ensure the reliable operation of the power system. However, SSCS still lacks an effective security mechanism
Zhaohan Li +5 more
doaj +1 more source
Inductive Learning of OWL 2 Property Chains
We present an algorithm to inductively learn Web Ontology Language (OWL) 2 property chains to be used in object subproperty axioms. For efficiency, it uses specialized encodings and data structures based on hash-maps and sparse matrices. The algorithm is
Jedrzej Potoniec
doaj +1 more source
An Anonymous Authentication Scheme Based on Chinese Residue Theorem in Wireless Body Area Networks
Considering the resource limitations of low-cost wireless sensors, there is a growing inclination to utilize cryptographic primitives that are optimized for efficiency, such as symmetric key encryption/decryption and hash functions, when designing ...
Jian Zhong +4 more
doaj +1 more source
A blockchain architecture with master-slave blockchain
With the continuous development of blockchain technology, different chains are derived due to different adaptation scenarios.Each chain has its own characteristics, such as public chains like bitcoin and ethereum, a large number of private chains and ...
Pengliu TAN, Lixuran WAN
doaj +2 more sources

