User-Generated Pseudonyms Through Merkle Trees [PDF]
Georgios Kermezis +5 more
openalex +1 more source
A Survey on the Integration of Blockchains and Databases. [PDF]
Zhu C, Li J, Zhong Z, Yue C, Zhang M.
europepmc +1 more source
Certificateless data integrity auditing with sparse Merkle trees for the cloud-edge environment. [PDF]
Du R, Wang Z, Shen J.
europepmc +1 more source
Lightweight data protection framework for secure edge transmission using IOTA-MAM. [PDF]
Lu F, Huang H, Cai Z, Chen J.
europepmc +1 more source
The Kupyna hash function cryptanalysis with Merkle Trees Signature schemes
О.Г. Качко, D. Televnyi
openalex +2 more sources
The Untapped Potential of Ascon Hash Functions: Benchmarking, Hardware Profiling, and Application Insights for Secure IoT and Blockchain Systems. [PDF]
Gladis Kurian M, Chen Y.
europepmc +1 more source
Post-Quantum Linkable Hash-Based Ring Signature Scheme for Off-Chain Payments in IoT. [PDF]
He L, Zhou X, Cai D, Hu X, Liu S.
europepmc +1 more source
A secured accreditation and equivalency certification using Merkle mountain range and transformer based deep learning model for the education ecosystem. [PDF]
Krishnan S, Rajendran S, Zakariah M.
europepmc +1 more source
Transparent and Privacy-Preserving Mobile Crowd-Sensing System with Truth Discovery. [PDF]
Jia R, Ma J, You Z, Zhang M.
europepmc +1 more source
Deep convolutional neural network based archimedes optimization algorithm for heart disease prediction based on secured IoT enabled health care monitoring system. [PDF]
S S, A V SB, S JJ, M M.
europepmc +1 more source

