Results 1 to 10 of about 14,519 (193)

An Efficient Two-Factor Authentication Scheme Based on the Merkle Tree [PDF]

open access: goldSensors, 2020
The Time-based One-Time Password (TOTP) algorithm is commonly used for two-factor authentication. In this algorithm, a shared secret is used to derive a One-Time Password (OTP). However, in TOTP, the client and the server need to agree on a shared secret
Xinming Yin   +5 more
doaj   +4 more sources

A fair non-collateral consensus protocol based on Merkle tree for hierarchical IoT blockchain [PDF]

open access: goldScientific Reports
In recent years, there has been a growing interest among researchers in Internet of Things Blockchain (IoTB). A critical aspect of IoTB is its consensus protocol, which faces challenges such as limited bandwidth, energy constraints, and storage space ...
Seyedeh Somayeh Fateminasab   +2 more
doaj   +3 more sources

User Verifiable Multiple Keyword Search Scheme using the Merkle Tree for Outsourced Data in the Cloud

open access: goldInternational Journal of Technology, 2017
Cloud computing has revolutionized the IT industry by offering huge storage for data outsourcing and also for computation. Various security issues concerned with security and privacy of data arise in the context of data outsourcing. The framework enables
Devi Thiyagarajan, R. Ganesan
doaj   +2 more sources

Ephemeral Keys Authenticated with Merkle Trees and Their Use in IoT Applications [PDF]

open access: goldSensors, 2021
Public key algorithms based on quasi-cyclic binary moderate-density parity-check codes (QC-MDPCs) and QC low-density parity-check codes (QC-LDPCs) codes for key encapsulation and encryption submitted to the NIST post-quantum competition (Bit Flipping Key
Pavol Zajac
doaj   +2 more sources

Improving Security and Reliability in Merkle Tree-Based Online Data Authentication with Leakage Resilience [PDF]

open access: goldApplied Sciences, 2018
With the successful proliferation of data outsourcing services, security and privacy issues have drawn significant attention. Data authentication in particular plays an essential role in the storage of outsourced digital content and keeping it safe from ...
Dongyoung Koo   +3 more
doaj   +2 more sources

IMPROVING SMART GRID SECURITY USING MERKLE TREES [PDF]

open access: gold, 2014
—Presently nations worldwide are starting to convert their aging electrical power infrastructures into modern, dynamic power grids. Smart Grid offers much in the way of efficiencies and robustness to the electrical power grid, however its heavy reliance ...
Muñoz, Melesio Calderón
core   +4 more sources

Algorithm for Key Transparency with Transparent Logs [version 2; peer review: 2 approved, 1 approved with reservations, 1 not approved] [PDF]

open access: yesOpen Research Europe
Background Cryptography plays a crucial role in securing digital communications and data storage. This study evaluates the Transparent Key Management Algorithm utilizing Merkle trees, focusing on its performance and security effectiveness in ...
Shasivar Rexhepi   +4 more
doaj   +2 more sources

An Image Authentication Scheme Using Merkle Tree Mechanisms

open access: goldFuture Internet, 2019
Research on digital image processing has become quite popular and rapid in recent years, and scholars have proposed various image verification mechanisms. Similarly , blockchain technology has also become very popular in recent years. This paper proposes
Yi-Cheng Chen   +2 more
doaj   +2 more sources

Evaluating the Security of Merkle Trees: An Analysis of Data Falsification Probabilities

open access: goldCryptography
Addressing the critical challenge of ensuring data integrity in decentralized systems, this paper delves into the underexplored area of data falsification probabilities within Merkle Trees, which are pivotal in blockchain and Internet of Things (IoT ...
Oleksandr Kuznetsov   +5 more
doaj   +2 more sources

Achieving Verifiable Decision Tree Prediction on Hybrid Blockchains [PDF]

open access: yesEntropy, 2023
Machine learning has become increasingly popular in academic and industrial communities and has been widely implemented in various online applications due to its powerful ability to analyze and use data.
Moxuan Fu   +5 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy