Results 171 to 180 of about 1,334,459 (231)
PUFchain 3.0: Hardware-Assisted Distributed Ledger for Robust Authentication in Healthcare Cyber-Physical Systems. [PDF]
Bathalapalli VKVV +4 more
europepmc +1 more source
Smart battery management in EVs using IoT, blockchain, and machine learning. [PDF]
Kavitha D, Sharmila B.
europepmc +1 more source
Investigating heterogeneity in IRTree models for multiple response processes with score-based partitioning. [PDF]
Debelak R, Meiser T, Gernand A.
europepmc +1 more source
This paper introduces the Cartesian Merkle Tree, a deterministic data structure that combines the properties of a Binary Search Tree, a Heap, and a Merkle tree. The Cartesian Merkle Tree supports insertions, updates, and removals of elements in $O(\log n)
Artem Chystiakov +2 more
semanticscholar +2 more sources
Coded Merkle Tree: Solving Data Availability Attacks in Blockchains [PDF]
In this paper, we propose coded Merkle tree (CMT), a novel hash accumulator that offers a constant-cost protection against data availability attacks in blockchains, even if the majority of the network nodes are malicious.
Mingchao Yu +5 more
semanticscholar +2 more sources
In this research, the Blockchain Merkle Tree, which plays a decisive role in ensuring the integrity and security of data in the blockchain network, is analyzed. The Merkle Tree, also known as a hash tree, is a fundamental concept in blockchain technology.
Absalamova Go'zal Bo'riboyevna
semanticscholar +3 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Hardware Accelerated Reusable Merkle Tree Generation for Bitcoin Blockchain Headers
IEEE computer architecture letters, 2023As the value of Bitcoin increases, the difficulty level of mining keeps increasing. This is generally addressed with application-specific integrated circuits (ASIC), but block candidates are still created by the software.
Kiseok Jeon +3 more
semanticscholar +1 more source
Efficient Distributed Secure Memory with Migratable Merkle Tree
International Symposium on High-Performance Computer Architecture, 2023Hardware-assisted enclaves with memory encryption have been widely adopted in the prevailing architectures, e.g., Intel SGX/TDX, AMD SEV, ARM CCA, etc.
Erhu Feng +3 more
semanticscholar +1 more source

