共 50 条
- [1] Secure Hash-based Search Protocols for RFID Systems INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2013, 6 (04): : 49 - 59
- [2] Authentication and micropayment protocols based on self-updating hash chains SIXTH INTERNATIONAL CONFERENCE ON GRID AND COOPERATIVE COMPUTING, PROCEEDINGS, 2007, : 467 - +
- [3] T/Key: Second-Factor Authentication From Secure Hash Chains CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 983 - 999
- [4] A secure credit-based cooperation stimulating mechanism for MANETs using hash chains FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2009, 25 (08): : 926 - 934
- [5] Determining Minimum Hash Width for Hash Chains THIRD CENTRAL EUROPEAN CYBERSECURITY CONFERENCE (CECC 2019), 2019,
- [6] Hierarchical key establishment protocols based on secure keyed one-way hash functions TWELFTH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN-12), PROCEEDINGS, 1998, : 162 - 167
- [8] On Fast Verification of Hash Chains TOPICS IN CRYPTOLOGY - CT-RSA 2010, PROCEEDINGS, 2010, 5985 : 382 - 396
- [9] Fast verification of hash chains TOPICS IN CRYPTOLOGY - CT-RSA 2004, PROCEEDINGS, 2004, 2964 : 339 - 352