Results 31 to 40 of about 32,420 (268)

Dynamically Updatable Multi-secret Sharing Scheme Without Trusted Center [PDF]

open access: yesJisuanji gongcheng, 2016
General dynamically updatable multi-secret sharing schemes require the participation of a trusted center,and the problems of adding or deleting several members or secrets simultaneously are not solved.A new multi-secret sharing scheme without trusted ...
GU Ting,DU Weizhang
doaj   +1 more source

Blockchain-Based Distributed Computing Consistency Verification for IoT Mobile Applications

open access: yesApplied Sciences, 2023
The maturation of wireless connectivity, blockchain (distributed ledger technologies), and intelligent systems has fostered a comprehensive ecosystem for the Internet of Things (IoT).
Jiahao Zhao, Yushu Zhang, Jiajia Jiang
doaj   +1 more source

JaxNet: Scalable Blockchain Network [PDF]

open access: yes, 2020
Today's world is organized based on merit and value. A single global currency that's decentralized is needed for a global economy. Bitcoin is a partial solution to this need, however it suffers from scalability problems which prevent it from being mass ...
Emelyanenko, Taras   +3 more
core   +1 more source

Renewable Multi-secret Sharing of Self-selecting Sub-secret [PDF]

open access: yesJisuanji gongcheng, 2016
The existing public verifiable multi-secret sharing schemes without trusted centers can not make sub-secrets self-selected and periodical renewable simultaneously.In order to solve the problem,a public verifiable and renewable multi-secret sharing scheme
GU Ting,DU Weizhang
doaj   +1 more source

MARAS: Mutual Authentication and Role-Based Authorization Scheme for Lightweight Internet of Things Applications

open access: yesSensors, 2023
The Internet of things (IoT) accommodates lightweight sensor/actuator devices with limited resources; hence, more efficient methods for known challenges are sought after. Message queue telemetry transport (MQTT) is a publish/subscribe-based protocol that
Özlem Şeker   +2 more
doaj   +1 more source

Hash-Based Signature with Constant-Sum Fingerprinting and Partial Construction of Hash Chains

open access: hybridProceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018
Yuichi Kaji   +2 more
openalex   +2 more sources

A Fair and Secure Cluster Formation Process for Ad Hoc Networks [PDF]

open access: yes, 2010
An efficient approach for organizing large ad hoc networks is to divide the nodes into multiple clusters and designate, for each cluster, a clusterhead which is responsible for holding intercluster control information. The role of a clusterhead entails
H. Rifà-Pous   +6 more
core   +1 more source

Atomic Crosschain Transactions for Ethereum Private Sidechains

open access: yesBlockchain: Research and Applications, 2022
The Atomic Crosschain Transaction for Ethereum Private Sidechains protocol allows composable programming across permissioned Ethereum blockchains. It allows for inter-contract and inter-blockchain function calls that are both synchronous and atomic: if ...
Peter Robinson   +2 more
doaj   +1 more source

Differential Analysis of a Cryptographic Hashing Algorithm HBC-256

open access: yesApplied Sciences, 2022
The article observes the new hashing algorithm HBC-256. The HBC-256 algorithm is based on the block cipher of the compression function CF (Compression Function) and produces a 256-bits hash value.
Kunbolat Algazy   +4 more
doaj   +1 more source

Fast parallel construction of variable-length Markov chains

open access: yesBMC Bioinformatics, 2021
Background Alignment-free methods are a popular approach for comparing biological sequences, including complete genomes. The methods range from probability distributions of sequence composition to first and higher-order Markov chains, where a k-th order ...
Joel Gustafsson   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy