Results 31 to 40 of about 91,922 (250)

On a method to authenticate and verify digital streams

open access: yesJournal of Telecommunications and Information Technology, 2002
Recently, digital streams have become widely used to make audio, video, and other media available in real-time over the Internet. As with other transmission methods, the recipient needs to have a possibility to verify the source and authenticity of the ...
Beata Joanna Wysocki   +2 more
doaj   +1 more source

Differential Analysis of a Cryptographic Hashing Algorithm HBC-256

open access: yesApplied Sciences, 2022
The article observes the new hashing algorithm HBC-256. The HBC-256 algorithm is based on the block cipher of the compression function CF (Compression Function) and produces a 256-bits hash value.
Kunbolat Algazy   +4 more
doaj   +1 more source

Digital signatures over HMAC entangled chains

open access: yesEngineering Science and Technology, an International Journal, 2022
In this work we present a new digital signature method based on hash chains and the hash message authentication code (HMAC). Unlike Blockchain technology, our approach establishes that the database of transactions is distributed among users, so each one ...
Luis Adrián Lizama-Pérez
doaj  

Fast parallel construction of variable-length Markov chains

open access: yesBMC Bioinformatics, 2021
Background Alignment-free methods are a popular approach for comparing biological sequences, including complete genomes. The methods range from probability distributions of sequence composition to first and higher-order Markov chains, where a k-th order ...
Joel Gustafsson   +3 more
doaj   +1 more source

A Deep Dive into Blockchain Selfish Mining [PDF]

open access: yes, 2018
This paper studies a fundamental problem regarding the security of blockchain on how the existence of multiple misbehaving pools influences the profitability of selfish mining.
Bai, Qianlan   +5 more
core   +2 more sources

Hash-Chain Fog/Edge: A Mode-Based Hash-Chain for Secured Mutual Authentication Protocol Using Zero-Knowledge Proofs in Fog/Edge [PDF]

open access: yesSensors, 2022
Authentication is essential for the prevention of various types of attacks in fog/edge computing. So, a novel mode-based hash chain for secure mutual authentication is necessary to address the Internet of Things (IoT) devices’ vulnerability, as there have been several years of growing concerns regarding their security.
Mayuresh Pardeshi   +2 more
openaire   +3 more sources

KALwEN: A New Practical and Interoperable Key Management Scheme for Body Sensor Networks [PDF]

open access: yes, 2008
Key management is the pillar of a security architecture. Body sensor networks(BSNs) pose several challenges -- some inherited from wireless sensor networks(WSNs), some unique to themselves -- that require a new key management scheme to be tailor-made ...
Gong, Z.   +4 more
core   +8 more sources

Hierarchical Multipath Blockchain Based IoT Information Management Techniques for Efficient Distributed Processing of Intelligent IoT Information

open access: yesSensors, 2021
As cloud technology advances, devices such as IoT (Internet of Things) are being utilized in various areas ranging from transportation, manufacturing, energy, automation, space, defense, and healthcare.
Yoon-Su Jeong, Sung-Ho Sim
doaj   +1 more source

JaxNet: Scalable Blockchain Network [PDF]

open access: yes, 2020
Today's world is organized based on merit and value. A single global currency that's decentralized is needed for a global economy. Bitcoin is a partial solution to this need, however it suffers from scalability problems which prevent it from being mass ...
Emelyanenko, Taras   +3 more
core   +1 more source

On the Error Resilience of Ordered Binary Decision Diagrams [PDF]

open access: yes, 2014
Ordered Binary Decision Diagrams (OBDDs) are a data structure that is used in an increasing number of fields of Computer Science (e.g., logic synthesis, program verification, data mining, bioinformatics, and data protection) for representing and ...
Bernasconi, Anna   +2 more
core   +3 more sources

Home - About - Disclaimer - Privacy