Skip to search formSkip to main contentSkip to account menu

Hash chain

Known as: Hash 
A hash chain is the successive application of a cryptographic hash function to a piece of data. In computer security, a hash chain is a method to… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Recently, providing services remotely over a network to enhance functionality and usability has become a trend. Applications… 
2017
2017
Esta tesis trata las diferentes limitaciones encontradas en WSN para habilitar su despliegue en nuevos escenarios, asi como… 
2011
2011
The complexity of software running on wireless sensor networks has increased over the years, and the need for an over-the-air… 
2010
2010
In this paper, we propose a Novel and Efficient Hash-chain based Certificate Management (NEHCM) scheme for vehicular… 
2010
2010
Radio Frequency Identification(RFID) is a new automatic identification technology. Widespread application of RFID may leak user's… 
2009
2009
Self-Updating Hash Chain can be used extensively in many fields, such as one time password(OTP), signatures and authentication… 
2006
2006
Micropayment schemes based on hash chain have been developed in recent years for hash function’s efficiency.Quan Son Nguyen… 
2004
2004
Current hash chain traversal techniques require that the intermediate links of the hash chain be stored secretly on a trusted… 
2002
2002
This paper introduces the important concept of signature revocation. An important property of digital signature is… 
2001
2001
This work is to have significant instance-management functions regarding digital signature. While a wide variety of the…