Results 31 to 40 of about 91,922 (250)
On a method to authenticate and verify digital streams
Recently, digital streams have become widely used to make audio, video, and other media available in real-time over the Internet. As with other transmission methods, the recipient needs to have a possibility to verify the source and authenticity of the ...
Beata Joanna Wysocki+2 more
doaj +1 more source
Differential Analysis of a Cryptographic Hashing Algorithm HBC-256
The article observes the new hashing algorithm HBC-256. The HBC-256 algorithm is based on the block cipher of the compression function CF (Compression Function) and produces a 256-bits hash value.
Kunbolat Algazy+4 more
doaj +1 more source
Digital signatures over HMAC entangled chains
In this work we present a new digital signature method based on hash chains and the hash message authentication code (HMAC). Unlike Blockchain technology, our approach establishes that the database of transactions is distributed among users, so each one ...
Luis Adrián Lizama-Pérez
doaj
Fast parallel construction of variable-length Markov chains
Background Alignment-free methods are a popular approach for comparing biological sequences, including complete genomes. The methods range from probability distributions of sequence composition to first and higher-order Markov chains, where a k-th order ...
Joel Gustafsson+3 more
doaj +1 more source
A Deep Dive into Blockchain Selfish Mining [PDF]
This paper studies a fundamental problem regarding the security of blockchain on how the existence of multiple misbehaving pools influences the profitability of selfish mining.
Bai, Qianlan+5 more
core +2 more sources
Hash-Chain Fog/Edge: A Mode-Based Hash-Chain for Secured Mutual Authentication Protocol Using Zero-Knowledge Proofs in Fog/Edge [PDF]
Authentication is essential for the prevention of various types of attacks in fog/edge computing. So, a novel mode-based hash chain for secure mutual authentication is necessary to address the Internet of Things (IoT) devices’ vulnerability, as there have been several years of growing concerns regarding their security.
Mayuresh Pardeshi+2 more
openaire +3 more sources
KALwEN: A New Practical and Interoperable Key Management Scheme for Body Sensor Networks [PDF]
Key management is the pillar of a security architecture. Body sensor networks(BSNs) pose several challenges -- some inherited from wireless sensor networks(WSNs), some unique to themselves -- that require a new key management scheme to be tailor-made ...
Gong, Z.+4 more
core +8 more sources
As cloud technology advances, devices such as IoT (Internet of Things) are being utilized in various areas ranging from transportation, manufacturing, energy, automation, space, defense, and healthcare.
Yoon-Su Jeong, Sung-Ho Sim
doaj +1 more source
JaxNet: Scalable Blockchain Network [PDF]
Today's world is organized based on merit and value. A single global currency that's decentralized is needed for a global economy. Bitcoin is a partial solution to this need, however it suffers from scalability problems which prevent it from being mass ...
Emelyanenko, Taras+3 more
core +1 more source
On the Error Resilience of Ordered Binary Decision Diagrams [PDF]
Ordered Binary Decision Diagrams (OBDDs) are a data structure that is used in an increasing number of fields of Computer Science (e.g., logic synthesis, program verification, data mining, bioinformatics, and data protection) for representing and ...
Bernasconi, Anna+2 more
core +3 more sources