Results 11 to 20 of about 91,922 (250)

Efficient Constructions for One-way Hash Chains [PDF]

open access: green, 2003
Abstract: "One-way chains are an important cryptographic primitive in many security applications. Lamport first proposed to use one-way chains for one-time password authentication [19]. Subsequently, researchers proposed one-way chains as a basic building block for digital cash, for extending the lifetime of digital certificates, for constructing one ...
Markus Jakobsson   +2 more
openaire   +4 more sources

A Survey of RFID Authentication Protocols Based on Hash-Chain Method [PDF]

open access: green, 2008
Security and privacy are the inherent problems in RFID communications. There are several protocols have been proposed to overcome those problems. Hash chain is commonly employed by the protocols to improve security and privacy for RFID authentication ...
Chang, Elizabeth   +3 more
core   +4 more sources

Selective Location Blinding Using Hash Chains [PDF]

open access: green, 2011
Location-based applications require a user's movements and positions to provide customized services. However, location is a sensitive piece of information that should not be revealed unless strictly necessary. In this paper we propose a procedure that allows a user to control the precision in which his location information is exposed to a service ...
Lenzini, Gabriele   +2 more
openaire   +5 more sources

Individual Displacements in Hashing with Coalesced Chains [PDF]

open access: greenCombinatorics, Probability and Computing, 2008
We study the asymptotic distribution of the displacements in hashing with coalesced chains, for both late-insertion and early-insertion. Asymptotic formulas for means and variances follow. The method uses Poissonization and some stochastic calculus.
Svante Janson
openaire   +5 more sources

A Key Distribution Scheme for WSN Based on Hash Chains and Deployment Knowledge [PDF]

open access: goldInternational Journal of Distributed Sensor Networks, 2015
Based on the deployment knowledge and the irreversibility of some hash chains, a novel pairwise key distribution scheme (DKH-KD) for wireless sensor networks is proposed.
Lin You   +3 more
doaj   +2 more sources

Digital signatures over hash-entangled chains [PDF]

open access: bronzeSN Applied Sciences, 2019
In this work we introduce a new approach for digital signature based on hash chains. The method is supported on the well known security principles of hash functions. Some main advantages of this public key system include security and estimated efficiency through the so called signature chains.
Luis Adrián Lizama-Pérez
openaire   +3 more sources

CHAIN: Exploring Global-Local Spatio-Temporal Information for Improved Self-Supervised Video Hashing [PDF]

open access: green, 2023
Compressing videos into binary codes can improve retrieval speed and reduce storage overhead. However, learning accurate hash codes for video retrieval can be challenging due to high local redundancy and complex global dependencies between video frames, especially in the absence of labels.
Rukai Wei   +5 more
arxiv   +3 more sources

Hey, That's My Model! Introducing Chain & Hash, An LLM Fingerprinting Technique [PDF]

open access: greenarXiv
Amid growing concerns over the ease of theft and misuse of Large Language Models (LLMs), the need for fingerprinting models has increased. Fingerprinting, in this context, means that the model owner can link a given model to their original version, thereby identifying if their model is being misused or has been completely stolen.
Mark Russinovich, Ahmed Salem
arxiv   +3 more sources

An Ordered Universal Accumulator Based on a Hash Chain

open access: goldApplied Sciences
Cryptographic accumulators are now fundamental for secure applications across blockchain, IoT, and big data, powering anonymous credentials, streamlining key management, and enabling efficient data filtering. However, existing accumulator methods, like RSA, bilinear pairing, and Merkle trees, are hampered by storage bloat, computational burdens, and ...
Wenbao Jiang   +3 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy