Results 91 to 100 of about 14,519 (193)

FC-LSR: Fog Computing-Based Lightweight Sybil Resistant Scheme in 5G-Enabled Vehicular Networks

open access: yesIEEE Access
Vehicular networks with Fifth-Generation (5G) are a new form of wireless communication that could greatly benefit society by lowering the number of preventable car accidents and entertaining passengers in a variety of ways.
Abdulwahab Ali Almazroi   +5 more
doaj   +1 more source

Knapsack Problem Solution based on Knapsack Packing Tree Search

open access: yesБезопасность информационных технологий, 2014
A number of asymmetric cryptosystems (including one of the very first asymmetric cryptosystems – the Merkle–Hellman cryptosystem) are based on the knapsack problem.
Mikhail Andreevich Kupriyashin   +1 more
doaj  

Study on data storage and verification methods based on improved Merkle mountain range in IoT scenarios

open access: yesJournal of King Saud University: Computer and Information Sciences
In the context of the rapid development of Internet of Things (IoT) technology and the extensive proliferation of the global Internet, the authenticity of data has become a focal point of societal demand. It plays a decisive role in enhancing the quality
Chufeng Liang   +7 more
doaj   +1 more source

A Novel Variability-Rich Scheme for Software Updates of Automotive Systems

open access: yesIEEE Access
The automotive industry is experiencing a significant evolution from traditional hardware-defined to software-defined architecture, enabling higher levels of autonomy, connectivity, safety, and richer in-vehicle experiences.
Abir Bazzi, Adnan Shaout, Di Ma
doaj   +1 more source

Asynchronous Merkle Trees [PDF]

open access: green, 2023
Anoushk Kharangate
openalex   +1 more source

Post-Quantum Digital Signature: Verkle-Based HORST

open access: yesJournal of Cybersecurity and Privacy
The security of commonly used cryptographic systems like RSA and ECC might be threatened by the future development of quantum computing. Verkle-based HORST decreases the size of signatures by 75% (from 12.8 KB to 3.2 KB) and enables O(1)-sized proofs by ...
Maksim Iavich   +2 more
doaj   +1 more source

Integrating Merkle Trees with Transformer Networks for Secure Financial Computation [PDF]

open access: gold
Xinyue Wang   +8 more
openalex   +1 more source

Software Update Methodologies for Feature-Based Product Lines: A Combined Design Approach

open access: yesSoftware
The automotive industry is experiencing a significant shift, transitioning from traditional hardware-centric systems to more advanced software-defined architectures. This change is enabling enhanced autonomy, connectivity, safety, and improved in-vehicle
Abir Bazzi, Adnan Shaout, Di Ma
doaj   +1 more source

Home - About - Disclaimer - Privacy