Some techniques for structuring chained hash tables [PDF]
openaire +2 more sources
Collider-based movement detection and control of wearable soft robots for visually augmenting dance performance. [PDF]
Twomey P, Varma V, Bush LL, Trkov M.
europepmc +1 more source
Localized Cancer Treatment Using Thiol-Ene Hydrogels for Dual Drug Delivery. [PDF]
Sathi Devi L+9 more
europepmc +1 more source
ACHealthChain blockchain framework for access control and privacy preservation in healthcare. [PDF]
Tawfik AM+3 more
europepmc +1 more source
RLH: Receiver driven layered hash chaining for multicast data origin authentification
Yacine Challal+2 more
openalex +3 more sources
Blockchain-Based Information Security Protection Mechanism for the Traceability of Intellectual Property Transactions. [PDF]
Wang Z+5 more
europepmc +1 more source
Efficient multicast source authentication using layered hash-chaining scheme [PDF]
Yacine Challal+2 more
openalex +1 more source
Intragroup and Intergroup Pairwise Key Predistribution for Wireless Sensor Networks. [PDF]
Yang CN, Gu TS, You JC, Wang CJ.
europepmc +1 more source
Secure AODV using Symmetric Key Cryptography with Cyclic Chain Hash Function (CCHF)
Sitanshu S. Singh+2 more
openalex +1 more source