Results 91 to 100 of about 1,334,459 (231)

Verification of a Merkle Patricia Tree Library Using F* [PDF]

open access: green, 2021
Sota Sato   +4 more
openalex   +1 more source

Modified Hash to Obtain Random Subset-Tree (MHORST) Using Merkle Tree and Mersenne Twister

open access: yesJOIN: Jurnal Online Informatika
The development of quantum computing triggers new challenges in data security, particularly in addressing attacks that can solve complex mathematical problems on the fly.
Faidhil Nugrah Ramadhan Ahmad   +1 more
doaj   +1 more source

TreePIR: Efficient Private Retrieval of Merkle Proofs via Tree Colorings with Fast Indexing and Zero Storage Overhead [PDF]

open access: green, 2022
Quang Cao   +11 more
openalex   +1 more source

Fractional Verkle Trees for Scalable Post-Quantum Signatures

open access: yesIEEE Access
Quantum computers threaten to break widely used cryptosystems like RSA and ECC, forcing us to develop new quantum-resistant alternatives. While hash-based signatures like SPHINCS+ offer a proven solution, their reliance on Merkle trees result in large ...
Maksim Iavich   +2 more
doaj   +1 more source

Medical data security and effective organization using integrated Blockchain principles in AI-based healthcare 6.0 infrastructures

open access: yesDiscover Computing
The future industry development for healthcare services needs an integrated edge, fog, and cloud computing infrastructures. The medical data security and integrity schemes help to operate the data carefully in healthcare networks.
Mohammad Gouse Galety   +3 more
doaj   +1 more source

FC-LSR: Fog Computing-Based Lightweight Sybil Resistant Scheme in 5G-Enabled Vehicular Networks

open access: yesIEEE Access
Vehicular networks with Fifth-Generation (5G) are a new form of wireless communication that could greatly benefit society by lowering the number of preventable car accidents and entertaining passengers in a variety of ways.
Abdulwahab Ali Almazroi   +5 more
doaj   +1 more source

Data structure and privacy protection analysis in big data environment based on blockchain technology

open access: yesInternational Journal of Intelligent Networks
In today's digital world, the rapid advancement of Information Technology (IT) has made it crucial to prioritize the protection and management of data storage and retrieval. It is vital to challenge the difficulties related to dispersed and decentralized
Yu Wang
doaj   +1 more source

Knapsack Problem Solution based on Knapsack Packing Tree Search

open access: yesБезопасность информационных технологий, 2014
A number of asymmetric cryptosystems (including one of the very first asymmetric cryptosystems – the Merkle–Hellman cryptosystem) are based on the knapsack problem.
Mikhail Andreevich Kupriyashin   +1 more
doaj  

Home - About - Disclaimer - Privacy