A secure group-based authentication protocol for IoVT in 5G-enabled smart transportation and road safety systems. [PDF]
Singh G +3 more
europepmc +1 more source
An O(n log n) Algorithm for Finding Minimal Perfect Hash Functions [PDF]
Edward A. Fox, Lenwood S. Heath, Qi Chen
openalex
Lightweight three-factor authentication protocol for 6G-enabled healthcare systems using Chebyshev chaotic maps and BioHashing. [PDF]
Abbas AM, Nasr ME, Abdelfatah RI.
europepmc +1 more source
Security Authentication Scheme for Vehicle-to-Everything Computing Task Offloading Environments. [PDF]
Liu Y, Li C, Sun Q, Jiang H.
europepmc +1 more source
A scalable post quantum secure blockchain framework with adaptive time consensus in cloud environments. [PDF]
Velmurugan M, Kumar MR.
europepmc +1 more source
The Untapped Potential of Ascon Hash Functions: Benchmarking, Hardware Profiling, and Application Insights for Secure IoT and Blockchain Systems. [PDF]
Gladis Kurian M, Chen Y.
europepmc +1 more source
A Survey on Proof of Sequential Work: Development, Security Analysis, and Application Prospects. [PDF]
Zhang J +7 more
europepmc +1 more source
Resilient cybersecurity in smart grid ICS communication using BLAKE3-driven dynamic key rotation and intrusion detection. [PDF]
Dokku NS +5 more
europepmc +1 more source
LEND and Faster Algorithms for Constructing Minimal Perfect Hash Functions [PDF]
Edward A. Fox, Qi Chen, Lenwood S. Heath
openalex
Ethical AI in Healthcare: Integrating Zero-Knowledge Proofs and Smart Contracts for Transparent Data Governance. [PDF]
Ezz M, Alaerjan AS, Mostafa AM.
europepmc +1 more source

