Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,289,902 papers from all fields of science
Search
Sign In
Create Free Account
Hash chain
Known as:
Hash
A hash chain is the successive application of a cryptographic hash function to a piece of data. In computer security, a hash chain is a method to…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
21 relations
Authentication
Challenge–response authentication
Computer security
Cross-site request forgery
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
False Data Filtering in Wireless Sensor Networks
Ze Luo
,
Lingzhi Zhu
,
Yunjie Chang
,
Qingyun Luo
,
Guixiang Li
,
Wei-Che Liao
2016
Corpus ID: 67041352
Abstract Wireless Sensor Networks (WSN) is often deployed in hostile environments, and the attacker can easily capture nodes to…
Expand
2009
2009
Enhanced delegation-based authentication protocol for PCSs
Tian-Fu Lee
,
T. Hwang
,
Shu-Hui Chang
,
Song-Kong Chong
IEEE Transactions on Wireless Communications
2009
Corpus ID: 19267351
Lee and Yeh recently presented a delegation-based authentication protocol for portable communication systems (PCSs), which is…
Expand
2009
2009
Micro-payment Protocol Based on Multiple Hash Chains
Hong Wang
,
Jialin Ma
,
Jing Sun
Second International Symposium on Electronic…
2009
Corpus ID: 13940589
With the development of Electronic commerce, more and more transactions on information goods or services have been or will be…
Expand
2009
2009
Privacy Preserving DRM Solution with Content Classification and Superdistribution
Jun Yao
,
Sunnam Lee
,
Suhyun Nam
6th IEEE Consumer Communications and Networking…
2009
Corpus ID: 16890459
Digital Rights Management (DRM) is indispensable to prevent various kinds of illegal content usage. However, personal privacy is…
Expand
2005
2005
Multi-Dimensional Hash Chains and Application to Micropayment Schemes
Q. Nguyen
International Workshop on Coding and Cryptography
2005
Corpus ID: 3206369
One-way hash chains have been used in many micropayment schemes due to their simplicity and efficiency. In this paper we…
Expand
2004
2004
A micro-payment scheme for multiple-vendor in m-commerce
Jianming Zhu
,
N. Wang
,
Jianfeng Ma
IEEE International Conference on E-Commerce…
2004
Corpus ID: 13062047
The micro-payment is an important technique in m-commerce (mobile commerce). Micro-payment refers to low-value financial…
Expand
2004
2004
A new fair micropayment system based on hash chain
Yong Zongkai
,
Lan Weimin
,
Tan Yunmeng
IEEE International Conference on e-Technology, e…
2004
Corpus ID: 195882539
Micropayment systems in existence usually do not provide fairness, which means that either the customer or the merchant, or both…
Expand
2003
2003
Improved Scalable Hash Chain Traversal
Sung-Ryul Kim
International Conference on Applied Cryptography…
2003
Corpus ID: 34629328
Yaron Sella recently proposed a scalable version of Jakobsson’s algorithm to traverse a hash chain of size n. Given the hash…
Expand
Highly Cited
2003
Highly Cited
2003
On The Computation-Storage Trade-Offs of Hash Chain Traversal
Yaron Sella
Financial Cryptography
2003
Corpus ID: 10339213
We study the problem of traversing a hash chain with a constant bound, m, on the number of hash-function evaluations allowed per…
Expand
2000
2000
Micropayments for Wireless Communications
DongGook Park
,
C. Boyd
,
E. Dawson
International Conference on Information Security…
2000
Corpus ID: 6480077
Electronic payment systems for wireless devices need to take into account the limited computational and storage ability of such…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE