Sign Up to like & get
recommendations!
1
Published in 2019 at "Neurocomputing"
DOI: 10.1016/j.neucom.2019.06.053
Abstract: Abstract Hashing methods are used to perform the approximate nearest neighbor search due to the low storage for binary codes and the fast computation of Hamming distance. However, in most of the hashing methods, the…
read more here.
Keywords:
fast online;
method based;
hash functions;
data sample ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2019 at "Journal of Applied Security Research"
DOI: 10.1080/19361610.2019.1613090
Abstract: Abstract Bloom filters (BF) are widely used in (wireless) network security protocols, searchable encryptions, and many other places. For performance and implementation issues, these applications prefer to use as few hash functions and as small…
read more here.
Keywords:
bloom filter;
hash functions;
bloom;
split bloom ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3195572
Abstract: The emergence of the Internet of Things (IoT) has enabled billions of devices that collect large amounts of data to be connected. Therefore, IoT security has fundamental requirements. One critical aspect of IoT security is…
read more here.
Keywords:
design trends;
hash;
cryptographic hash;
hash functions ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3215778
Abstract: In modern cryptography, hash functions are considered as one of the key components for secure communication. They play a vital role in a wide range of applications such as ensuring the authentication and integrity of…
read more here.
Keywords:
based applications;
hash;
hash functions;
hash based ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Access"
DOI: 10.1109/access.2023.3269571
Abstract: RFID tags are prone to counterfeit attacks in supply chain scenarios. The attacker often uses counterfeit tags to replace stolen tags to avoid being detected by the inventory process. To defend against such attacks, existing…
read more here.
Keywords:
rfid tags;
slot;
fast counterfeit;
detection ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2017 at "IEEE Transactions on Computers"
DOI: 10.1109/tc.2017.2693185
Abstract: This paper focuses on parallel hash functions based on tree modes of operation for an inner Variable-Input-Length function. This inner function can be either a single-block-length (SBL) and prefix-free MD hash function, or a sponge-based…
read more here.
Keywords:
parallel hash;
tree modes;
hash functions;
topology ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2023 at "Computer Optics"
DOI: 10.18287/2412-6179-co-1215
Abstract: An adaptive steganography algorithm for data hiding in full-color images based on iterative introduction of minor distortions into blocks of container images and the use of high-speed non-cryptographic hash functions for data extraction is considered.…
read more here.
Keywords:
functions data;
steganography;
steganography algorithm;
cryptographic hash ... See more keywords