Results 41 to 50 of about 91,922 (250)
Hash-chain-based authentication for IoT
The number of everyday interconnected devices continues to increase and constitute the Internet of Things (IoT). Things are small computers equipped with sensors and wireless communications capabilities that are driven by energy constraints, since they use batteries and may be required to operate over long periods of time. The majority of these devices
Ricardo Costa, António Pinto
openaire +4 more sources
As the development of IoT technologies has progressed rapidly recently, most IoT data are focused on monitoring and control to process IoT data, but the cost of collecting and linking various IoT data increases, requiring the ability to proactively ...
Sung-Ho Sim, Yoon-Su Jeong
doaj +1 more source
Exact enumeration of Hamiltonian circuits, walks, and chains in two and three dimensions [PDF]
We present an algorithm for enumerating exactly the number of Hamiltonian chains on regular lattices in low dimensions. By definition, these are sets of k disjoint paths whose union visits each lattice vertex exactly once.
Bousquet-Mélou M+7 more
core +4 more sources
A blockchain index structure based on subchain query
Blockchain technology has the characteristics of decentralization and tamper resistance, which can store data safely and reduce the cost of trust effectively.
Xiaogang Xing+4 more
doaj +1 more source
When Are Learned Models Better Than Hash Functions? [PDF]
In this work, we aim to study when learned models are better hash functions, particular for hash-maps. We use lightweight piece-wise linear models to replace the hash functions as they have small inference times and are sufficiently general to capture complex distributions.
arxiv
Abstract The agri‐food supply chain has been a popular research topic in recent years. The combination of a demand for products of high quality and safety standards and the increasing number of stakeholders in supply chain networks has required the agri‐food business to transform from vertically integrated to vertically operated supply chain networks ...
Thanh_Tuan Chu, Thi Thu Tra Pham
wiley +1 more source
Covert Channels in One-Time Passwords Based on Hash Chains [PDF]
We present a covert channel between two network devices where one authenticates itself with Lamport's one-time passwords based on a cryptographic hash function. Our channel enables plausible deniability. We also present countermeasures to detect the presence of such a covert channel, which are non-trivial because hash values are randomly looking binary
Keller, Jörg, Wendzel, Steffen
openaire +3 more sources
Blockchain-Based Agri-Food Supply Chain: A Complete Solution
Supply chains are evolving into automated and highly complex networks and are becoming an important source of potential benefits in the modern world. At the same time, consumers are now more interested in food product quality.
Affaf Shahid+5 more
doaj +1 more source
Novel self-renewal hash chain scheme based on (t,n) threshold and division tree
The introduction of renewal hash chain overcame resource-constrained defect in traditional hash chains,but the existing renewable schemes had still held unsatisfactory performance especially on security and complexity.The definitions of repetition ...
Hai-ping HUANG+4 more
doaj +2 more sources
High resolution remote sensing (HRRS) images are widely used in many sensitive fields, and their security should be protected thoroughly. Integrity authentication is one of their major security problems, while the traditional techniques cannot fully meet
Kaimeng Ding+4 more
doaj +1 more source