An Efficient data management Scheme for Hierarchical Multi-processing using Double Hash Chain
Yoon-Su Jeong+2 more
openalex +2 more sources
T/Key: Second-Factor Authentication From Secure Hash Chains
Dmitry Kogan, Nathan Manohar, Dan Boneh
openalex +2 more sources
Validator selection using pre-committed hash chains
Validators pre-commit hash chains of length w. When creating a block, validators commit the pre-image to the current hash in their hash chain, and combines it with the random number Selector, hash(x) ⊕ Selector. This random number selects the next validator.
openaire +2 more sources
Hash-Based Signature with Constant-Sum Fingerprinting and Partial Construction of Hash Chains
Yoshio Yatani+2 more
openaire +2 more sources
Blockchain enabled traceability in the jewel supply chain. [PDF]
Patel A+4 more
europepmc +1 more source
Practical security analysis and attack strategies on permutation functions used in IoT supply chain systems. [PDF]
Mokhtari N+5 more
europepmc +1 more source
Modelling of queuing systems using blockchain based on Markov process for smart healthcare systems. [PDF]
Siddiqui S+5 more
europepmc +1 more source
Video Streaming Security: Reliable Hash Chain Mechanism Using Redundancy Codes
Emad Abd-Elrahman+2 more
openalex +1 more source
Synergized security framework: revolutionizing wireless sensor networks through comparative methodological analysis. [PDF]
Su G, Zhang B.
europepmc +1 more source