Results 41 to 50 of about 32,420 (268)

Novel self-renewal hash chain scheme based on (t,n) threshold and division tree

open access: yesTongxin xuebao, 2013
The introduction of renewal hash chain overcame resource-constrained defect in traditional hash chains,but the existing renewable schemes had still held unsatisfactory performance especially on security and complexity.The definitions of repetition ...
Hai-ping HUANG   +4 more
doaj   +2 more sources

Hierarchical Multipath Blockchain Based IoT Information Management Techniques for Efficient Distributed Processing of Intelligent IoT Information

open access: yesSensors, 2021
As cloud technology advances, devices such as IoT (Internet of Things) are being utilized in various areas ranging from transportation, manufacturing, energy, automation, space, defense, and healthcare.
Yoon-Su Jeong, Sung-Ho Sim
doaj   +1 more source

Hash-chain-based authentication for IoT

open access: yesADCAIJ: Advances in Distributed Computing and Artificial Intelligence Journal, 2016
The number of everyday interconnected devices continues to increase and constitute the Internet of Things (IoT). Things are small computers equipped with sensors and wireless communications capabilities that are driven by energy constraints, since they use batteries and may be required to operate over long periods of time. The majority of these devices
Antonio PINTO, Ricardo COSTA
openaire   +3 more sources

Proof of Luck: an Efficient Blockchain Consensus Protocol [PDF]

open access: yes, 2017
In the paper, we present designs for multiple blockchain consensus primitives and a novel blockchain system, all based on the use of trusted execution environments (TEEs), such as Intel SGX-enabled CPUs.
Castro M.   +4 more
core   +2 more sources

A Water‐Soluble PVA Macrothiol Enables Two‐Photon Microfabrication of Cell‐Interactive Hydrogel Structures at 400 mm s−1

open access: yesAdvanced Materials, EarlyView.
A PVA‐based macromolecular thiol‐ene formulation enables efficient two‐photon polymerization at extremely low polymer concentrations and high writing speeds of 400 mm s−1 (20×), allowing high‐fidelity laser writing of cell‐interactive hydrogel structures on demand.
Wanwan Qiu   +6 more
wiley   +1 more source

Perceptual Hashing Based Forensics Scheme for the Integrity Authentication of High Resolution Remote Sensing Image

open access: yesInformation, 2018
High resolution remote sensing (HRRS) images are widely used in many sensitive fields, and their security should be protected thoroughly. Integrity authentication is one of their major security problems, while the traditional techniques cannot fully meet
Kaimeng Ding   +4 more
doaj   +1 more source

Inactivation of AXL in Cardiac Fibroblasts Alleviates Right Ventricular Remodeling in Pulmonary Hypertension

open access: yesAdvanced Science, EarlyView.
Pulmonary hypertension (PH) is a progressive condition with high morbidity and mortality, largely owing to right ventricular (RV) failure resulting from maladaptive remodeling. Our study provides strong evidence in support of a critical, detrimental role for AXL as a previously unrecognized determinant driving RV fibrotic pathology in PH.
Li‐Wei Wu   +17 more
wiley   +1 more source

Digital signatures over hash-entangled chains [PDF]

open access: yesSN Applied Sciences, 2019
In this work we introduce a new approach for digital signature based on hash chains. The method is supported on the well known security principles of hash functions. Some main advantages of this public key system include security and estimated efficiency through the so called signature chains.
openaire   +1 more source

NAD⁺ Reduction in Glutamatergic Neurons Induces Lipid Catabolism and Neuroinflammation in the Brain via SARM1

open access: yesAdvanced Science, EarlyView.
NAD⁺ homeostasis maintains neuronal integrity through opposing actions of NMNAT2 and SARM1. Loss of NMNAT2 in glutamatergic neurons reprograms cortical metabolism from glucose to lipid catabolism, depletes lipid stores, and triggers inflammation and neurodegeneration.
Zhen‐Xian Niou   +9 more
wiley   +1 more source

Multi-Blockchain-Based IoT Data Processing Techniques to Ensure the Integrity of IoT Data in AIoT Edge Computing Environments

open access: yesSensors, 2021
As the development of IoT technologies has progressed rapidly recently, most IoT data are focused on monitoring and control to process IoT data, but the cost of collecting and linking various IoT data increases, requiring the ability to proactively ...
Sung-Ho Sim, Yoon-Su Jeong
doaj   +1 more source

Home - About - Disclaimer - Privacy