Sign Up to like & get
recommendations!
1
Published in 2019 at "Neurocomputing"
DOI: 10.1016/j.neucom.2019.06.053
Abstract: Abstract Hashing methods are used to perform the approximate nearest neighbor search due to the low storage for binary codes and the fast computation of Hamming distance. However, in most of the hashing methods, the…
read more here.
Keywords:
fast online;
method based;
hash functions;
data sample ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2019 at "Journal of Applied Security Research"
DOI: 10.1080/19361610.2019.1613090
Abstract: Abstract Bloom filters (BF) are widely used in (wireless) network security protocols, searchable encryptions, and many other places. For performance and implementation issues, these applications prefer to use as few hash functions and as small…
read more here.
Keywords:
bloom filter;
hash functions;
bloom;
split bloom ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3195572
Abstract: The emergence of the Internet of Things (IoT) has enabled billions of devices that collect large amounts of data to be connected. Therefore, IoT security has fundamental requirements. One critical aspect of IoT security is…
read more here.
Keywords:
design trends;
hash;
cryptographic hash;
hash functions ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3215778
Abstract: In modern cryptography, hash functions are considered as one of the key components for secure communication. They play a vital role in a wide range of applications such as ensuring the authentication and integrity of…
read more here.
Keywords:
based applications;
hash;
hash functions;
hash based ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Access"
DOI: 10.1109/access.2023.3269571
Abstract: RFID tags are prone to counterfeit attacks in supply chain scenarios. The attacker often uses counterfeit tags to replace stolen tags to avoid being detected by the inventory process. To defend against such attacks, existing…
read more here.
Keywords:
rfid tags;
slot;
fast counterfeit;
detection ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "IEEE Access"
DOI: 10.1109/access.2025.3611280
Abstract: Lightweight cryptographic primitives are commonly used to secure communication in resource-constrained IoT devices such as RFID tags, sensors, actuators, wireless sensor networks, and edge gateways. This paper surveys a selection of key hardware-based lightweight hash…
read more here.
Keywords:
hardware;
hash functions;
constrained iot;
security ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2017 at "IEEE Transactions on Computers"
DOI: 10.1109/tc.2017.2693185
Abstract: This paper focuses on parallel hash functions based on tree modes of operation for an inner Variable-Input-Length function. This inner function can be either a single-block-length (SBL) and prefix-free MD hash function, or a sponge-based…
read more here.
Keywords:
parallel hash;
tree modes;
hash functions;
topology ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"
DOI: 10.1109/tcad.2023.3320633
Abstract: Protection of integrated circuits (ICs) against hardware security threats has been tackled by many schemes proposed to mitigate risks associated with an unauthorized access and usage of ICs in general, and intellectual property (IP) cores…
read more here.
Keywords:
hash;
hash functions;
h2b crypto;
crypto hash ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2023 at "Computer Optics"
DOI: 10.18287/2412-6179-co-1215
Abstract: An adaptive steganography algorithm for data hiding in full-color images based on iterative introduction of minor distortions into blocks of container images and the use of high-speed non-cryptographic hash functions for data extraction is considered.…
read more here.
Keywords:
functions data;
steganography;
steganography algorithm;
cryptographic hash ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "Applied Sciences"
DOI: 10.3390/app142411967
Abstract: Blockchain has several unique features: data integrity, security, privacy, and immutability. For this reason, it is considered one of the most promising new technologies for a wide range of applications. Initially prominent in cryptocurrencies such…
read more here.
Keywords:
hash functions;
blockchain iot;
hashlea;
iot systems ... See more keywords