Results 181 to 190 of about 1,334,459 (231)
Some of the next articles are maybe not open access.
IEEE International Symposium on Hardware Oriented Security and Trust, 2023
Prospects of novel flash-based, crash-tolerant, non-volatile memory (NVM) such as Intel’s Optane DC memory [17] and future CXL-based persistent memory [28] bring about new and exciting usage scenarios for both general-purpose and embedded computing ...
Rakin Muhammad Shadab +3 more
semanticscholar +1 more source
Prospects of novel flash-based, crash-tolerant, non-volatile memory (NVM) such as Intel’s Optane DC memory [17] and future CXL-based persistent memory [28] bring about new and exciting usage scenarios for both general-purpose and embedded computing ...
Rakin Muhammad Shadab +3 more
semanticscholar +1 more source
IEEE Journal on Selected Areas in Information Theory, 2023
Data availability (DA) attack is a well-known problem in certain blockchains where users accept an invalid block with unavailable portions. Previous works have used LDPC and 2-D Reed Solomon (2D-RS) codes with Merkle trees to mitigate DA attacks.
Debarnab Mitra, Lev Tauz, L. Dolecek
semanticscholar +1 more source
Data availability (DA) attack is a well-known problem in certain blockchains where users accept an invalid block with unavailable portions. Previous works have used LDPC and 2-D Reed Solomon (2D-RS) codes with Merkle trees to mitigate DA attacks.
Debarnab Mitra, Lev Tauz, L. Dolecek
semanticscholar +1 more source
Toward a Green Blockchain: Engineering Merkle Tree and Proof of Work for Energy Optimization
IEEE Transactions on Network and Service Management, 2022Blockchain-powered smart systems deployed in different industrial applications promise operational efficiencies and improved yields, while significantly mitigating cybersecurity risks.
Cesar Castellon Escobar +4 more
semanticscholar +1 more source
Optimization of Merkle Tree Structures: A Focus on Subtree Implementation
International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2023A Merkle hash tree is an efficient data structure for generating a cryptographic commitment to a dynamic repository of records. For a database with N entries, the Merkle tree includes $2N-1$ cryptographic hashes as the nodes of the tree.
Prasad Ayyalasomayajula +1 more
semanticscholar +1 more source
Concurrency and Computation, 2023
Cloud computing is considered as the most fabulous paradigm to accommodate various kinds of user information. However, the privacy conflicts integrated with computational complexities need more hybridized resource efficiency for hassle‐free accession ...
Durgesh M. Sharma +2 more
semanticscholar +1 more source
Cloud computing is considered as the most fabulous paradigm to accommodate various kinds of user information. However, the privacy conflicts integrated with computational complexities need more hybridized resource efficiency for hassle‐free accession ...
Durgesh M. Sharma +2 more
semanticscholar +1 more source
Merkle Tree: A Fundamental Component of Blockchains
2021 International Conference on Electronic Information Engineering and Computer Science (EIECS), 2021With the increasing popularity of blockchain technology, Merkle trees (or hash trees) are playing significant roles in verifying and retrieving data for the implementation of blockchain for allowing efficient and secure verification of the contents of ...
Haojun Liu +3 more
semanticscholar +1 more source
Review and Investigation of Merkle Tree’s Technical Principles and Related Application Fields
2021 International Conference on Artificial Intelligence, Big Data and Algorithms (CAIBDA), 2021In cryptography, many different data structures are used to store and encrypt data. Merkle Tree is such a data structure that provides a way to prove data integrity and validity. It requires less memory or disk space than other data structures, resulting
Shimin Jing, Xin Zheng, Zhengwen Chen
semanticscholar +1 more source
EMT: Extended Merkle Tree Structure for Inserted Data Redaction in Permissioned Blockchain
IEEE Transactions on Network Science and EngineeringInserted data redaction is an important and hot security topic for permissioned blockchain. However, existing redactable schemes have two problems: (i) Uncaptured Change: Transaction-level redaction schemes modify both user-inserted data and system ...
Zihan Wu +3 more
semanticscholar +1 more source
A Service Placement Algorithm Based on Merkle Tree in MEC Systems Assisted by Digital Twin Networks
2022 IEEE 21st International Conference on Ubiquitous Computing and Communications (IUCC/CIT/DSCI/SmartCNS), 2022This paper considers a digital twin network (DTN) assisted mobile edge computing (MEC) system. When wireless device (WD) users request services from MECs, we assume in the system there are a cloud server, storing all of service entities, and a ...
Cheng Dai, Kun Yang, Chunjian Deng
semanticscholar +1 more source
FaaSMT: Lightweight Serverless Framework for Intrusion Detection Using Merkle Tree and Task Inlining
arXiv.orgThe serverless platform aims to facilitate cloud applications' straightforward deployment, scaling, and management. Unfortunately, the distributed nature of serverless computing makes it difficult to port traditional security tools directly. The existing
Chuang Li +5 more
semanticscholar +1 more source

