Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,975,804 papers from all fields of science
Search
Sign In
Create Free Account
Hash chain
Known as:
Hash
A hash chain is the successive application of a cryptographic hash function to a piece of data. In computer security, a hash chain is a method to…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
21 relations
Authentication
Challenge–response authentication
Computer security
Cross-site request forgery
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Anti-Continuous Collisions User Based Unpredictable Iterative Password Salted Hash Encryption
Munqath Alattar
,
Ali Al Farawn
,
Nabeel Salih Ali
International Journal of Internet Technology and…
2018
Corpus ID: 196153683
Recently, providing services remotely over a network to enhance functionality and usability has become a trend. Applications…
Expand
2017
2017
Integrating secure mobile p2p systems and wireless sensor networks
M. Prieto
2017
Corpus ID: 67052691
Esta tesis trata las diferentes limitaciones encontradas en WSN para habilitar su despliegue en nuevos escenarios, asi como…
Expand
2011
2011
Dependable Over-the-Air Programming
J. Bohli
,
A. Hessler
,
K. Maier
,
Osman Ugus
,
D. Westhoff
Ad Hoc Sens. Wirel. Networks
2011
Corpus ID: 29427557
The complexity of software running on wireless sensor networks has increased over the years, and the need for an over-the-air…
Expand
2010
2010
NEHCM: A Novel and Efficient Hash-chain based Certificate Management scheme for vehicular communications
Yipin Sun
,
R. Lu
,
Xiaodong Lin
,
Jinshu Su
,
X. Shen
International ICST Conference on Communications…
2010
Corpus ID: 10210031
In this paper, we propose a Novel and Efficient Hash-chain based Certificate Management (NEHCM) scheme for vehicular…
Expand
2010
2010
An Improved RFID Privacy Protection Scheme Based on Hash-Chain
Ya-ling Zhang
,
Huijie Guo
International Conference on Logistics Engineering…
2010
Corpus ID: 18757864
Radio Frequency Identification(RFID) is a new automatic identification technology. Widespread application of RFID may leak user's…
Expand
2009
2009
A New Self-Updating Hash Chain Structure Scheme
Minqing Zhang
,
Bin Dong
,
Xiaoyuan Yang
International Conference on Computational…
2009
Corpus ID: 7946119
Self-Updating Hash Chain can be used extensively in many fields, such as one time password(OTP), signatures and authentication…
Expand
2006
2006
Payword Scheme Based on Two-dimensional Hash Chain
Tian Jinbing
2006
Corpus ID: 57023537
Micropayment schemes based on hash chain have been developed in recent years for hash function’s efficiency.Quan Son Nguyen…
Expand
2004
2004
Construction and Traversal of Hash Chain with Public Links
Vipul Goyal
IACR Cryptology ePrint Archive
2004
Corpus ID: 413500
Current hash chain traversal techniques require that the intermediate links of the hash chain be stored secretly on a trusted…
Expand
2002
2002
A Model For Signature Revocation
Rui Zhang
,
M. Kudo
,
Kanta Matsuura
,
H. Imai
2002
Corpus ID: 9747783
This paper introduces the important concept of signature revocation. An important property of digital signature is…
Expand
2001
2001
Revocation of Digital Signature and Its Applications
Rui Zhang
,
Michiharu Kudoh
,
Kanta Matsuura
,
H. Imai
2001
Corpus ID: 73607496
This work is to have significant instance-management functions regarding digital signature. While a wide variety of the…
Expand