Skip to search formSkip to main contentSkip to account menu

Hash chain

Known as: Hash 
A hash chain is the successive application of a cryptographic hash function to a piece of data. In computer security, a hash chain is a method to… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Abstract Wireless Sensor Networks (WSN) is often deployed in hostile environments, and the attacker can easily capture nodes to… 
2009
2009
Lee and Yeh recently presented a delegation-based authentication protocol for portable communication systems (PCSs), which is… 
2009
2009
With the development of Electronic commerce, more and more transactions on information goods or services have been or will be… 
2009
2009
Digital Rights Management (DRM) is indispensable to prevent various kinds of illegal content usage. However, personal privacy is… 
2005
2005
One-way hash chains have been used in many micropayment schemes due to their simplicity and efficiency. In this paper we… 
2004
2004
The micro-payment is an important technique in m-commerce (mobile commerce). Micro-payment refers to low-value financial… 
2004
2004
Micropayment systems in existence usually do not provide fairness, which means that either the customer or the merchant, or both… 
2003
2003
Yaron Sella recently proposed a scalable version of Jakobsson’s algorithm to traverse a hash chain of size n. Given the hash… 
Highly Cited
2003
Highly Cited
2003
We study the problem of traversing a hash chain with a constant bound, m, on the number of hash-function evaluations allowed per… 
2000
2000
Electronic payment systems for wireless devices need to take into account the limited computational and storage ability of such…