Results 191 to 200 of about 1,334,459 (231)
Some of the next articles are maybe not open access.
An Untraceable Credential Revocation Approach Based on a Novel Merkle Tree Accumulator
International Conference on BlockchainAs digital identity gains increasing importance, current centralized digital identity systems face significant limitations. Recent years have seen a shift towards decentralized and self-sovereign identity models, underpinned by verifiable credentials and
Nacereddine Sitouah +4 more
semanticscholar +1 more source
IEEE Transactions on Dependable and Secure Computing
With high-impact cyber-attacks on the rise, provisioning cybersecurity to the emerging Internet of Things (IoT) systems typically comprising of modern embedded computing platforms becomes significantly more challenging to achieve.
Rakin Muhammad Shadab +4 more
semanticscholar +1 more source
With high-impact cyber-attacks on the rise, provisioning cybersecurity to the emerging Internet of Things (IoT) systems typically comprising of modern embedded computing platforms becomes significantly more challenging to achieve.
Rakin Muhammad Shadab +4 more
semanticscholar +1 more source
IEEE International Symposium on Hardware Oriented Security and Trust, 2021
Emerging byte-addressable Non-Volatile Memory (NVM) technology, although promising superior memory density and ultra-low energy consumption, poses unique challenges to guaranteeing memory confidentiality, integrity, and crash-consistency.
Yu Zou, Amro Awad, Mingjie Lin
semanticscholar +1 more source
Emerging byte-addressable Non-Volatile Memory (NVM) technology, although promising superior memory density and ultra-low energy consumption, poses unique challenges to guaranteeing memory confidentiality, integrity, and crash-consistency.
Yu Zou, Amro Awad, Mingjie Lin
semanticscholar +1 more source
Hashing In Blockchain Using Merkle Tree POW Cosensus Algorithms
2024 International Conference on Trends in Quantum Computing and Emerging Business TechnologiesThe preface of Privacy based decentralized application and massive information Analytics has been illustrate the consequence of block chain tools to the industry.
Ashok Kumar K, Anathajothi K
semanticscholar +1 more source
Comparing Execution Trace Using Merkle- Tree to Detect Backward Incompatibilities
IEEE International Conference on Software Analysis, Evolution, and ReengineeringThe use of libraries is crucial in software development. Library users should update their libraries to address bugs and vulnerabilities that are fixed in newer versions.
Atsuhito Yamaoka +4 more
semanticscholar +1 more source
Merkle Tree and Blockchain-Based Cloud Data Auditing
International Journal of Cloud Applications and Computing, 2020Cloud computing is the fastest growing and most promising field in the service provisioning segment. It has become a challenging task to provide security in the cloud.
A. Mohan +2 more
semanticscholar +1 more source
A Data Trusted Transmission Mechanism for IOT Based on Merkle Tree
International Symposium on Communications and Information Technologies, 2022In order to solve the communication security problem between clusters and clusters. This paper proposes a data-trusted transmission mechanism based on Merkle authentication, which guarantees the correctness, integrity, confidentiality and reliability of ...
Yaxin Zhao, Chunzi Chen
semanticscholar +1 more source
Baobab Merkle Tree for Efficient Secure Memory
IEEE computer architecture lettersSecure memory is a natural solution to hardware vulnerabilities in memory, but it faces fundamental challenges of performance and memory overheads. While significant work has gone into optimizing the protocol for performance, far less work has gone into ...
Samuel Thomas +7 more
semanticscholar +1 more source
Periodic Integration: A Differential Approach to Merkle Tree Configuration
IEEE International Conference on Electronics, Computing and Communication TechnologiesBlockchain technology's transformation of digital transactions and payments is achieved through the introduction of a decentralised ledger system. The integration of Merkle Trees within blockchain systems is explored in this study, with an investigation ...
Kanthimathi S +2 more
semanticscholar +1 more source
Knowledge and Information Systems, 2023
M. Lakshmanan, G. S. Anandha Mala
semanticscholar +1 more source
M. Lakshmanan, G. S. Anandha Mala
semanticscholar +1 more source

