14,979 Hits in 6.0 sec

Weighted One-Way Hash Chain and Its Applications [chapter]

Yen Sung-Ming, Yuliang Zheng
2000 Lecture Notes in Computer Science  
In this paper, we propose a new concept called a weighted one-way hash chain. We then proceed to use the new concept to improve in a significant way the performance of micropayment schemes.  ...  An one-way hash chain generated by the iterative use of a one-way hash function on a secret value has recently been widely employed to develop many practical cryptographic solutions, especially electronic  ...  The authors wish to thank Chung-Kai Hwang from the Department of Computer Science, National Central University for stimulating discussions on the special weighting assignment algorithms.  ... 
doi:10.1007/3-540-44456-4_11 fatcat:shl7c54hvrcprjqcpdj77mdk5i

A Secure Electronic Payment Protocol for Wireless Mesh Networks

Helen Cheung, Cungang Yang
2014 International journal of network security and its applications  
In this article, we propose a one way hash chain structure based on which efficient and secure payment protocols that support both prepaid and credit-based paying schemes are introduced.  ...  KEYWORDS multiparty micropayment, payment certificate, hash chain, wireless mesh networks, electronic payment  ...  For the following end values of secondary chain, MR/MC can authenticate them as follows: it voids the long chain of the one-way hash chain.  ... 
doi:10.5121/ijnsa.2014.6501 fatcat:n6e4ibeeabb4tazkmw7vx3jwbm

Multi-Dimensional Hash Chains and Application to Micropayment Schemes [chapter]

Quan Son Nguyen
2006 Lecture Notes in Computer Science  
One-way hash chains have been used in many micropayment schemes due to their simplicity and efficiency.  ...  In this paper we introduce the notion of multi-dimensional hash chains, which is a new generalization of traditional one-way hash chains.  ...  It is based on one-way hash chains described in the section 2.  ... 
doi:10.1007/11779360_18 fatcat:w2qi4p2v2rel5phh23ca4d5sfm

Securizing data linkage in french public statistics

Maxence Guesdon, Eric Benzenine, Kamel Gadouche, Catherine Quantin
2016 BMC Medical Informatics and Decision Making  
We propose an organization and a data workflow, based on hashing and cyrptographic techniques, to strongly compartmentalize identifying and not-identifying data.  ...  The NIR (a national identifier) is widely used in medico-social administrations, and this would theoretically provide considerable scope for data matching, on condition that the legislation on such matters  ...  Acknowledgements Not applicable. Availability of data and materials Not applicable. 1  ... 
doi:10.1186/s12911-016-0366-4 pmid:27716178 pmcid:PMC5053094 fatcat:p4q6tkruhjcmhh55tu3udldrou

IoT Based Vehicle Mounted Weight Sensors

2019 International journal of recent technology and engineering  
This paper will provide an integration of smart sensors and the Internet of Things (IoT) and Block Chain integration together on one platform, we propose in this paper using the block chain technology  ...  of the trucks, if any extra goods are been added then it can be alerted nonstop to the government agencies on the real-time or the weight on the trucks can be monitored by the central government organization  ...  Pritam Gajkumar Shah and Dr. Michael Herrmann; they are the initiator of this work as well as I thank for their inspiration and motivation, and keep going with the endless research paper works.  ... 
doi:10.35940/ijrte.d8304.118419 fatcat:dpckur7akfewrn7mqxnlfh3e3y

HSKAS: A Novel Hierarchical Shared Key Authentication Scheme in Wireless Sensor Networks

Zeyu Sun, Xiaohui Ji, Yuanbo Li
2016 International Journal of Security and Its Applications  
for one central node.  ...  We take the HNNs with four cells (N=16) as an example to illuminate how one bit shared key is achieved.  ...  In authentication phase, each node has a well-known hash function H on it. Assume H is one-way and thus it is intractable to invert.  ... 
doi:10.14257/ijsia.2016.10.4.12 fatcat:fwzkpcxqyncn5a3sxnicdnwjay

Authenticating Multimedia Transmitted Over Wireless Networks: A Content-Aware Stream-Level Approach

Zhi Li, Yong Lian, Qibin Sun, Chang Chen
2006 2006 IEEE International Conference on Multimedia and Expo  
The scheme is designed in such a way that it facilitates explicit capture and exploitation of channel condition as well as how the multimedia content is packetized and transmitted.  ...  The design allows the integration of authentication with the framework of Joint Source and Channel Coding (JSCC) to achieve adaptiveness to the content and efficient utilization of limited bandwidth.  ...  ξi and mi are the weight, AP and the number of hash chains of Pi, respectively.  ... 
doi:10.1109/icme.2006.262446 dblp:conf/icmcs/LiLSC06 fatcat:cvpg32k2jzbwvbaw6wcetfbhky

Bayesi-Chain: Intelligent Identity Authentication

Juanita Blue, Joan Condell, Tom Lunney, Eoghan Furey
2018 2018 29th Irish Signals and Systems Conference (ISSC)  
This is achieved through application of machine learning and Bayesian probabilistic modelling techniques.  ...  This paper outlines the design and initial development of a solution that utilizes data sourced from an individual's digital footprint to assess the likelihood that it pertains to a 'real' identity.  ...  As additional identity sources are added to blocks, they will be combined with the previous 'block' by way of one-way hashing, producing a new hash value with each subsequent block.  ... 
doi:10.1109/issc.2018.8585369 fatcat:4i5jij3mgvgevp7ubp4paoc65i

SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks

Yih-Chun Hu, David B. Johnson, Adrian Perrig
2003 Ad hoc networks  
or processing time, we use efficient one-way hash functions and do not use asymmetric cryptographic operations in the protocol.  ...  In this paper, we design and evaluate the Secure Efficient Ad hoc Distance vector routing protocol (SEAD), a secure ad hoc network routing protocol based on the design of the Destination-Sequenced Distance-Vector  ...  , Schlumberger, Bosch, Rice University, Carnegie Mellon University, or the US Government or any of its agencies.  ... 
doi:10.1016/s1570-8705(03)00019-2 fatcat:vmzkzm4kbfaqpnuq5lhmaptlhm

Bootstrapping the Blockchain, with Applications to Consensus and Fast PKI Setup [chapter]

Juan A. Garay, Aggelos Kiayias, Nikos Leonardos, Giorgos Panagiotakos
2018 Lecture Notes in Computer Science  
The Bitcoin backbone protocol (Eurocrypt 2015) extracts basic properties of Bitcoin's underlying blockchain data structure, such as "common prefix" and "chain quality," and shows how fundamental applications  ...  By running this procedure in a pre-processing stage, it is then suggested in [2] that a standard authenticated broadcast protocol (specifically, the one by Dolev and Strong [13]) could be run.  ...  with respect to the hash functions G(·), H(·)), and the way they interpret the chain.  ... 
doi:10.1007/978-3-319-76581-5_16 fatcat:iipo5643ojdefohdovodx4fwvi

Efficient data structures for sparse network representation

Jörkki Hyvönen, Jari Saramäki, Kimmo Kaski
2008 International Journal of Computer Mathematics  
The performance benchmarks show that it is, indeed, quite superior to its commonly used counterparts in this application.  ...  In this Article, we present a cache efficient data structure, a variant of a linear probing hash table, for representing edge sets of such networks.  ...  This combination is expected to be able to combine high performance with easy usage and the possibility to perform rapid experimentation on networks.  ... 
doi:10.1080/00207160701753629 fatcat:gxva4pkgijhibhlh2oyo76p5ca

Protecting the integrity of the training procedure of neural networks [article]

Christian Berghoff
2020 arXiv   pre-print
This creates several problems, for instance in terms of safety and IT security for high-risk applications, where assuring these properties is crucial.  ...  One of the most striking IT security problems aggravated by the opacity of neural networks is the possibility of so-called poisoning attacks during the training phase, where an attacker inserts specially  ...  Acknowledgements The author would like to thank Ute Gebhardt and Matthias Neu for carefully proofreading earlier versions of this document and providing valuable suggestions for improvement.  ... 
arXiv:2005.06928v1 fatcat:rtlnqggglbaynfgzi4ripten4i

Efficient Constructions for One-Way Hash Chains [chapter]

Yih-Chun Hu, Markus Jakobsson, Adrian Perrig
2005 Lecture Notes in Computer Science  
One-way chains are an important cryptographic primitive in many security applications.  ...  In this paper we present two new constructions for one-way hash chains, which significantly improve the efficiency of one-way chains.  ...  Our future work includes investigating deeper hierarchies of our constructions, and to establish general bounds for the one-way chain costs.  ... 
doi:10.1007/11496137_29 fatcat:geletmkozfgujjcncpp6aelkry

Threat Modeling—How to Visualize Attacks on IOTA?

Ikram Ullah, Gerard de de Roode, Nirvana Meratnia, Paul Havinga
2021 Sensors  
IOTA has already been implemented in many applications and has clearly demonstrated its significance in real-world applications.  ...  We used Common Vulnerability Scoring System (CVSS v3.0) to further categorize these vulnerabilities on the basis of their feasibility and impact.  ...  In [55] it is suggested to "keep track of the unique hash of each signed transaction bundle", and then only allow one instance of a bundle hash in a subtangle.  ... 
doi:10.3390/s21051834 pmid:33800712 pmcid:PMC7975986 fatcat:spw47bipbrbito5vpqfqratfse

Maintaining source privacy under eavesdropping and node compromise attacks

Kanthakumar Pongaliur, Li Xiao
2011 2011 Proceedings IEEE INFOCOM  
We analyze the ability of our proposed scheme to withstand different attacks and demonstrate its efficiency in terms of overhead and functionality when compared to existing work.  ...  The packet is modified en route by dynamically selected nodes to make it difficult for a malicious entity to traceback the packet to a source node and also prevent packet spoofing.  ...  ACKNOWLEDGEMENT This work was supported in part by the US National Science Foundation under Grants CCF-0514078, CNS-0551464, and CNS-0721441.  ... 
doi:10.1109/infcom.2011.5934959 dblp:conf/infocom/PongaliurX11 fatcat:rdye3semqfa6pfii3ada74jh6q
« Previous Showing results 1 — 15 out of 14,979 results