A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2007; you can also visit the original URL.
The file type is application/pdf
.
Filters
Weighted One-Way Hash Chain and Its Applications
[chapter]
2000
Lecture Notes in Computer Science
In this paper, we propose a new concept called a weighted one-way hash chain. We then proceed to use the new concept to improve in a significant way the performance of micropayment schemes. ...
An one-way hash chain generated by the iterative use of a one-way hash function on a secret value has recently been widely employed to develop many practical cryptographic solutions, especially electronic ...
The authors wish to thank Chung-Kai Hwang from the Department of Computer Science, National Central University for stimulating discussions on the special weighting assignment algorithms. ...
doi:10.1007/3-540-44456-4_11
fatcat:shl7c54hvrcprjqcpdj77mdk5i
A Secure Electronic Payment Protocol for Wireless Mesh Networks
2014
International journal of network security and its applications
In this article, we propose a one way hash chain structure based on which efficient and secure payment protocols that support both prepaid and credit-based paying schemes are introduced. ...
KEYWORDS multiparty micropayment, payment certificate, hash chain, wireless mesh networks, electronic payment ...
For the following end values of secondary chain, MR/MC can authenticate them as follows:
it voids the long chain of the one-way hash chain. ...
doi:10.5121/ijnsa.2014.6501
fatcat:n6e4ibeeabb4tazkmw7vx3jwbm
Multi-Dimensional Hash Chains and Application to Micropayment Schemes
[chapter]
2006
Lecture Notes in Computer Science
One-way hash chains have been used in many micropayment schemes due to their simplicity and efficiency. ...
In this paper we introduce the notion of multi-dimensional hash chains, which is a new generalization of traditional one-way hash chains. ...
It is based on one-way hash chains described in the section 2. ...
doi:10.1007/11779360_18
fatcat:w2qi4p2v2rel5phh23ca4d5sfm
Securizing data linkage in french public statistics
2016
BMC Medical Informatics and Decision Making
We propose an organization and a data workflow, based on hashing and cyrptographic techniques, to strongly compartmentalize identifying and not-identifying data. ...
The NIR (a national identifier) is widely used in medico-social administrations, and this would theoretically provide considerable scope for data matching, on condition that the legislation on such matters ...
Acknowledgements Not applicable.
Availability of data and materials Not applicable. 1 ...
doi:10.1186/s12911-016-0366-4
pmid:27716178
pmcid:PMC5053094
fatcat:p4q6tkruhjcmhh55tu3udldrou
IoT Based Vehicle Mounted Weight Sensors
2019
International journal of recent technology and engineering
This paper will provide an integration of smart sensors and the Internet of Things (IoT) and Block Chain integration together on one platform, we propose in this paper using the block chain technology ...
of the trucks, if any extra goods are been added then it can be alerted nonstop to the government agencies on the real-time or the weight on the trucks can be monitored by the central government organization ...
Pritam Gajkumar Shah and Dr. Michael Herrmann; they are the initiator of this work as well as I thank for their inspiration and motivation, and keep going with the endless research paper works. ...
doi:10.35940/ijrte.d8304.118419
fatcat:dpckur7akfewrn7mqxnlfh3e3y
HSKAS: A Novel Hierarchical Shared Key Authentication Scheme in Wireless Sensor Networks
2016
International Journal of Security and Its Applications
for one central node. ...
We take the HNNs with four cells (N=16) as an example to illuminate how one bit shared key is achieved. ...
In authentication phase, each node has a well-known hash function H on it. Assume H is one-way and thus it is intractable to invert. ...
doi:10.14257/ijsia.2016.10.4.12
fatcat:fwzkpcxqyncn5a3sxnicdnwjay
Authenticating Multimedia Transmitted Over Wireless Networks: A Content-Aware Stream-Level Approach
2006
2006 IEEE International Conference on Multimedia and Expo
The scheme is designed in such a way that it facilitates explicit capture and exploitation of channel condition as well as how the multimedia content is packetized and transmitted. ...
The design allows the integration of authentication with the framework of Joint Source and Channel Coding (JSCC) to achieve adaptiveness to the content and efficient utilization of limited bandwidth. ...
ξi and mi are the weight, AP and the number of hash chains of Pi, respectively. ...
doi:10.1109/icme.2006.262446
dblp:conf/icmcs/LiLSC06
fatcat:cvpg32k2jzbwvbaw6wcetfbhky
Bayesi-Chain: Intelligent Identity Authentication
2018
2018 29th Irish Signals and Systems Conference (ISSC)
This is achieved through application of machine learning and Bayesian probabilistic modelling techniques. ...
This paper outlines the design and initial development of a solution that utilizes data sourced from an individual's digital footprint to assess the likelihood that it pertains to a 'real' identity. ...
As additional identity sources are added to blocks, they will be combined with the previous 'block' by way of one-way hashing, producing a new hash value with each subsequent block. ...
doi:10.1109/issc.2018.8585369
fatcat:4i5jij3mgvgevp7ubp4paoc65i
SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks
2003
Ad hoc networks
or processing time, we use efficient one-way hash functions and do not use asymmetric cryptographic operations in the protocol. ...
In this paper, we design and evaluate the Secure Efficient Ad hoc Distance vector routing protocol (SEAD), a secure ad hoc network routing protocol based on the design of the Destination-Sequenced Distance-Vector ...
, Schlumberger, Bosch, Rice University, Carnegie Mellon University, or the US Government or any of its agencies. ...
doi:10.1016/s1570-8705(03)00019-2
fatcat:vmzkzm4kbfaqpnuq5lhmaptlhm
Bootstrapping the Blockchain, with Applications to Consensus and Fast PKI Setup
[chapter]
2018
Lecture Notes in Computer Science
The Bitcoin backbone protocol (Eurocrypt 2015) extracts basic properties of Bitcoin's underlying blockchain data structure, such as "common prefix" and "chain quality," and shows how fundamental applications ...
By running this procedure in a pre-processing stage, it is then suggested in [2] that a standard authenticated broadcast protocol (specifically, the one by Dolev and Strong [13]) could be run. ...
with respect to the hash functions G(·), H(·)), and the way they interpret the chain. ...
doi:10.1007/978-3-319-76581-5_16
fatcat:iipo5643ojdefohdovodx4fwvi
Efficient data structures for sparse network representation
2008
International Journal of Computer Mathematics
The performance benchmarks show that it is, indeed, quite superior to its commonly used counterparts in this application. ...
In this Article, we present a cache efficient data structure, a variant of a linear probing hash table, for representing edge sets of such networks. ...
This combination is expected to be able to combine high performance with easy usage and the possibility to perform rapid experimentation on networks. ...
doi:10.1080/00207160701753629
fatcat:gxva4pkgijhibhlh2oyo76p5ca
Protecting the integrity of the training procedure of neural networks
[article]
2020
arXiv
pre-print
This creates several problems, for instance in terms of safety and IT security for high-risk applications, where assuring these properties is crucial. ...
One of the most striking IT security problems aggravated by the opacity of neural networks is the possibility of so-called poisoning attacks during the training phase, where an attacker inserts specially ...
Acknowledgements The author would like to thank Ute Gebhardt and Matthias Neu for carefully proofreading earlier versions of this document and providing valuable suggestions for improvement. ...
arXiv:2005.06928v1
fatcat:rtlnqggglbaynfgzi4ripten4i
Efficient Constructions for One-Way Hash Chains
[chapter]
2005
Lecture Notes in Computer Science
One-way chains are an important cryptographic primitive in many security applications. ...
In this paper we present two new constructions for one-way hash chains, which significantly improve the efficiency of one-way chains. ...
Our future work includes investigating deeper hierarchies of our constructions, and to establish general bounds for the one-way chain costs. ...
doi:10.1007/11496137_29
fatcat:geletmkozfgujjcncpp6aelkry
Threat Modeling—How to Visualize Attacks on IOTA?
2021
Sensors
IOTA has already been implemented in many applications and has clearly demonstrated its significance in real-world applications. ...
We used Common Vulnerability Scoring System (CVSS v3.0) to further categorize these vulnerabilities on the basis of their feasibility and impact. ...
In [55] it is suggested to "keep track of the unique hash of each signed transaction bundle", and then only allow one instance of a bundle hash in a subtangle. ...
doi:10.3390/s21051834
pmid:33800712
pmcid:PMC7975986
fatcat:spw47bipbrbito5vpqfqratfse
Maintaining source privacy under eavesdropping and node compromise attacks
2011
2011 Proceedings IEEE INFOCOM
We analyze the ability of our proposed scheme to withstand different attacks and demonstrate its efficiency in terms of overhead and functionality when compared to existing work. ...
The packet is modified en route by dynamically selected nodes to make it difficult for a malicious entity to traceback the packet to a source node and also prevent packet spoofing. ...
ACKNOWLEDGEMENT This work was supported in part by the US National Science Foundation under Grants CCF-0514078, CNS-0551464, and CNS-0721441. ...
doi:10.1109/infcom.2011.5934959
dblp:conf/infocom/PongaliurX11
fatcat:rdye3semqfa6pfii3ada74jh6q
« Previous
Showing results 1 — 15 out of 14,979 results