A method for the protection of the message in social network service(SNS) using access control and hash-chain [PDF]
Hanjae Jeong, Dongho Won
openalex +1 more source
Comparative evaluation and simulation of blockchain consensus mechanisms for secure and scalable peer to peer energy trading in microgrids. [PDF]
Bhavana GB +5 more
europepmc +1 more source
Hey, That's My Model! Introducing Chain & Hash, An LLM Fingerprinting Technique [PDF]
Mark Russinovich, Ahmed Salem
openalex +1 more source
Design of a Blockchain-Enabled Traceability System for <i>Pleurotus ostreatus</i> Supply Chains. [PDF]
Guo H, Xu W, Lin M, Zhang X, Liu P.
europepmc +1 more source
A lightweight scalable and dynamic blockchain-based model for storing and retrieving patient healthcare records. [PDF]
Soleimani Nadaf SR +3 more
europepmc +1 more source
Research on anti-replay attack mechanism of intelligent connected vehicles based on hashing chain and V2X communication [PDF]
Quanrui Huo +3 more
openalex +1 more source
GeoCross: A Privacy-Preserving and Fine-Grained Authorization Scheme for Cross-Chain Geological Data Sharing. [PDF]
Lin L, Feng B, Jing P.
europepmc +1 more source
A Study on the Concept of Using Efficient Lightweight Hash Chain to Improve Authentication in VMF Military Standard [PDF]
Dohoon Kim +4 more
openalex +1 more source
Data Component Method Based on Dual-Factor Ownership Identification with Multimodal Feature Fusion. [PDF]
Nie S, Shi J, Zhou X, Lu M.
europepmc +1 more source
Implementing Hashing Using Separate Chaining in Java
Timothy M. Dietrich, Nicholas J. DeLillo
openalex +1 more source

