Results 191 to 200 of about 1,334,459 (231)
Some of the next articles are maybe not open access.

An Untraceable Credential Revocation Approach Based on a Novel Merkle Tree Accumulator

International Conference on Blockchain
As digital identity gains increasing importance, current centralized digital identity systems face significant limitations. Recent years have seen a shift towards decentralized and self-sovereign identity models, underpinned by verifiable credentials and
Nacereddine Sitouah   +4 more
semanticscholar   +1 more source

A Secure Computing System With Hardware-Efficient Lazy Bonsai Merkle Tree for FPGA-Attached Embedded Memory

IEEE Transactions on Dependable and Secure Computing
With high-impact cyber-attacks on the rise, provisioning cybersecurity to the emerging Internet of Things (IoT) systems typically comprising of modern embedded computing platforms becomes significantly more challenging to achieve.
Rakin Muhammad Shadab   +4 more
semanticscholar   +1 more source

HERMES: Hardware-Efficient Speculative Dataflow Architecture for Bonsai Merkle Tree-Based Memory Authentication

IEEE International Symposium on Hardware Oriented Security and Trust, 2021
Emerging byte-addressable Non-Volatile Memory (NVM) technology, although promising superior memory density and ultra-low energy consumption, poses unique challenges to guaranteeing memory confidentiality, integrity, and crash-consistency.
Yu Zou, Amro Awad, Mingjie Lin
semanticscholar   +1 more source

Hashing In Blockchain Using Merkle Tree POW Cosensus Algorithms

2024 International Conference on Trends in Quantum Computing and Emerging Business Technologies
The preface of Privacy based decentralized application and massive information Analytics has been illustrate the consequence of block chain tools to the industry.
Ashok Kumar K, Anathajothi K
semanticscholar   +1 more source

Comparing Execution Trace Using Merkle- Tree to Detect Backward Incompatibilities

IEEE International Conference on Software Analysis, Evolution, and Reengineering
The use of libraries is crucial in software development. Library users should update their libraries to address bugs and vulnerabilities that are fixed in newer versions.
Atsuhito Yamaoka   +4 more
semanticscholar   +1 more source

Merkle Tree and Blockchain-Based Cloud Data Auditing

International Journal of Cloud Applications and Computing, 2020
Cloud computing is the fastest growing and most promising field in the service provisioning segment. It has become a challenging task to provide security in the cloud.
A. Mohan   +2 more
semanticscholar   +1 more source

A Data Trusted Transmission Mechanism for IOT Based on Merkle Tree

International Symposium on Communications and Information Technologies, 2022
In order to solve the communication security problem between clusters and clusters. This paper proposes a data-trusted transmission mechanism based on Merkle authentication, which guarantees the correctness, integrity, confidentiality and reliability of ...
Yaxin Zhao, Chunzi Chen
semanticscholar   +1 more source

Baobab Merkle Tree for Efficient Secure Memory

IEEE computer architecture letters
Secure memory is a natural solution to hardware vulnerabilities in memory, but it faces fundamental challenges of performance and memory overheads. While significant work has gone into optimizing the protocol for performance, far less work has gone into ...
Samuel Thomas   +7 more
semanticscholar   +1 more source

Periodic Integration: A Differential Approach to Merkle Tree Configuration

IEEE International Conference on Electronics, Computing and Communication Technologies
Blockchain technology's transformation of digital transactions and payments is achieved through the introduction of a decentralised ledger system. The integration of Merkle Trees within blockchain systems is explored in this study, with an investigation ...
Kanthimathi S   +2 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy