Ads
-
Related paper
- Introducing Two-Factor Authentication for the Block Chain Protocol with help of Hash Algorithm
- CRYPTOGRAPHIC HASH KEY ALGORITHM TO MITIGATE WORMHOLE ATTACKS AND LURE CATCH ALGORITHM TO BLOCK THE ATTACKERS
- Message Authentication Protocol for Lifetime Proficient Hash Based Algorithm in Wireless Sensor Networks
- A COMPREHENSIVE STUDY ON BLOCK CHAIN TECHNOLOGY IN SUPPLY-CHAIN MANAGEMENT
- APPLICATION OF BLOCK CHAIN TECHNOLOGY IN MANUFACTURING INDUSTRIES TO OPTIMIZE SUPPLY CHAIN AND LOGISTIC OPERATIONS
- COUNTERFEITING IN AVIATION SUPPLY CHAIN, ITS CONSEQUENCES, AND BLOCK CHAIN AS A POTENTIAL SOLUTION: AN AWARENESS AND HAZARD-BASED ANALYSIS
- A Survey on Encrypted String Search Using Hash Chain Technique
- Vulnerabilities and Improvements on HRAP+, a Hash-Based RFID Authentication Protocol
- Efficient incremental hash chain with probabilistic filter-based method to update blockchain light nodes
- IMPLEMENTATION OF SECURE HASH ALGORITHM SHA-1 BY LABVIEW?