EON blockchain was "scaled down" due to the Merkle tree
Finally, the Merkle tree is built logically for protecting data integrity.
In the SWHash scheme, the memory is partitioned into chunks and a l-level Merkle tree is built up for integrity verification.
Hash trees also named Merkle trees were proposed in  as a protocol to authenticate data integrity efficiently.
Merkle trees are widely used in storage and memory integrity protection.
In cryptography, Merkle tree
considers a binary tree which consists of many nodes; each non-leaf node is imprinted with the hash of the names of its child nodes.
Merkle Tree We use a Merkle Tree to maintain all the stored data file.
a Merkle Tree, as in [3,5] to maintain the authentication structure.
Then Ugenerates a root R based on the construction of a Merkle Tree, where the leave nodes represents an ordered set of hashes of "file tags", i.