Results 41 to 50 of about 91,922 (250)

Hash-chain-based authentication for IoT

open access: yesADCAIJ: Advances in Distributed Computing and Artificial Intelligence Journal, 2016
The number of everyday interconnected devices continues to increase and constitute the Internet of Things (IoT). Things are small computers equipped with sensors and wireless communications capabilities that are driven by energy constraints, since they use batteries and may be required to operate over long periods of time. The majority of these devices
Ricardo Costa, António Pinto
openaire   +4 more sources

Multi-Blockchain-Based IoT Data Processing Techniques to Ensure the Integrity of IoT Data in AIoT Edge Computing Environments

open access: yesSensors, 2021
As the development of IoT technologies has progressed rapidly recently, most IoT data are focused on monitoring and control to process IoT data, but the cost of collecting and linking various IoT data increases, requiring the ability to proactively ...
Sung-Ho Sim, Yoon-Su Jeong
doaj   +1 more source

Exact enumeration of Hamiltonian circuits, walks, and chains in two and three dimensions [PDF]

open access: yes, 2007
We present an algorithm for enumerating exactly the number of Hamiltonian chains on regular lattices in low dimensions. By definition, these are sets of k disjoint paths whose union visits each lattice vertex exactly once.
Bousquet-Mélou M   +7 more
core   +4 more sources

A blockchain index structure based on subchain query

open access: yesJournal of Cloud Computing: Advances, Systems and Applications, 2021
Blockchain technology has the characteristics of decentralization and tamper resistance, which can store data safely and reduce the cost of trust effectively.
Xiaogang Xing   +4 more
doaj   +1 more source

When Are Learned Models Better Than Hash Functions? [PDF]

open access: yesarXiv, 2021
In this work, we aim to study when learned models are better hash functions, particular for hash-maps. We use lightweight piece-wise linear models to replace the hash functions as they have small inference times and are sufficiently general to capture complex distributions.
arxiv  

Vertical coordination in agri‐food supply chain and blockchain: A proposed framework solution for Vietnamese cashew nut business

open access: yesRegional Science Policy &Practice, EarlyView., 2022
Abstract The agri‐food supply chain has been a popular research topic in recent years. The combination of a demand for products of high quality and safety standards and the increasing number of stakeholders in supply chain networks has required the agri‐food business to transform from vertically integrated to vertically operated supply chain networks ...
Thanh_Tuan Chu, Thi Thu Tra Pham
wiley   +1 more source

Covert Channels in One-Time Passwords Based on Hash Chains [PDF]

open access: yesProceedings of the European Interdisciplinary Cybersecurity Conference, 2020
We present a covert channel between two network devices where one authenticates itself with Lamport's one-time passwords based on a cryptographic hash function. Our channel enables plausible deniability. We also present countermeasures to detect the presence of such a covert channel, which are non-trivial because hash values are randomly looking binary
Keller, Jörg, Wendzel, Steffen
openaire   +3 more sources

Blockchain-Based Agri-Food Supply Chain: A Complete Solution

open access: yesIEEE Access, 2020
Supply chains are evolving into automated and highly complex networks and are becoming an important source of potential benefits in the modern world. At the same time, consumers are now more interested in food product quality.
Affaf Shahid   +5 more
doaj   +1 more source

Novel self-renewal hash chain scheme based on (t,n) threshold and division tree

open access: yesTongxin xuebao, 2013
The introduction of renewal hash chain overcame resource-constrained defect in traditional hash chains,but the existing renewable schemes had still held unsatisfactory performance especially on security and complexity.The definitions of repetition ...
Hai-ping HUANG   +4 more
doaj   +2 more sources

Perceptual Hashing Based Forensics Scheme for the Integrity Authentication of High Resolution Remote Sensing Image

open access: yesInformation, 2018
High resolution remote sensing (HRRS) images are widely used in many sensitive fields, and their security should be protected thoroughly. Integrity authentication is one of their major security problems, while the traditional techniques cannot fully meet
Kaimeng Ding   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy