We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 5,336 results
  1. Deterministic Hash and Linear Congruential BlowFish Extreme Learning for User Authentication in Cloud Computing

    Advanced technology of Cloud Computing (CC) is to provide the services without straight executive of users and demand for resources. It is very...

    S. Radha, S. Jeyalaksshmi in SN Computer Science
    Article 14 October 2023
  2. An improved hash algorithm for monitoring network traffic in the internet of things

    With the prompt development of network technology, Internet of Things (IoT), and the speedy enhancement of network performance, numerous network...

    Teng Zhan, Shi** Chen in Cluster Computing
    Article 02 June 2022
  3. Accelerated Parallel Hybrid GPU/CPU Hash Table Queries with String Keys

    GPUs can accelerate hash tables for fast storage and look-ups utilizing their massive parallelism. State-of-the-art GPU hash tables use keys with...
    Tobias Groth, Sven Groppe, ... Martin Koppehel in Database and Expert Systems Applications
    Conference paper 2022
  4. Table Optimizations

    During the life cycle of your data-tier applications, you may need to perform a number of maintenance tasks and performance optimizations against the...
    Chapter 2023
  5. GPU-Based Dynamic Hyperspace Hash with Full Concurrency

    Hyperspace hashing which is often applied to NoSQL data-bases builds indexes by map** objects with multiple attributes to a multidimensional space....

    Zhuo Ren, Yu Gu, ... Ge Yu in Data Science and Engineering
    Article Open access 17 June 2021
  6. Hybrid CPU/GPU/APU accelerated query, insert, update and erase operations in hash tables with string keys

    Modern computer systems can use different types of hardware acceleration to achieve massive performance improvements. Some accelerators like FPGA and...

    Tobias Groth, Sven Groppe, ... Martin Koppehel in Knowledge and Information Systems
    Article Open access 26 May 2023
  7. Patent Landscape in the field of Hash-Based Post-Quantum Signatures

    Post-Quantum Cryptography (PQC) is one of the most fascinating topics of recent developments in cryptography. Following the ongoing standardization...
    Megha Agrawal, Kumar Duraisamy, ... Vishal Saraswat in Progress in Cryptology – INDOCRYPT 2023
    Conference paper 2024
  8. Multiprocessing Implementation for Building a DNA q-gram Index Hash Table

    Over the past few years, next-generation sequencing has become an invaluable technology for numerous applications in the field of genomics. The...
    Candace Claire Mercado, Aaron Russell Fajardo, ... Roger Luis Uy in Computational Science and Technology
    Conference paper 2021
  9. A scalable post-quantum hash-based group signature

    We present a construction for hash-based one-time group signature schemes, and develop a traceable post-quantum multi-time group signature upon it. A...

    Masoumeh Shafieinejad, Navid Nasr Esfahani in Designs, Codes and Cryptography
    Article 24 March 2021
  10. Efficient Flow Table Caching Architecture and Replacement Policy for SDN Switches

    Software-defined networks (SDN) rely on flow tables to forward packets from different flows with different policies. To speed up packet forwarding,...

    **anfeng Li, Haoran Sun, Yan Huang in Journal of Network and Systems Management
    Article 18 June 2024
  11. GraphTango: A Hybrid Representation Format for Efficient Streaming Graph Updates and Analysis

    Streaming graph processing performs batched updates and analytics on a time-evolving graph. The underlying representation format of the graph largely...

    Alif Ahmed, Farzana Ahmed Siddique, Kevin Skadron in International Journal of Parallel Programming
    Article Open access 18 May 2024
  12. Algorithmic Aspects of Distributed Hash Tables on Cloud, Fog, and Edge Computing Applications: A Survey

    In the current era, where data is expanding due to the unforeseen volume, velocity, and variety of data types produced by IoT devices, there is an...
    Aristeidis Karras, Christos Karras, ... Christos Zaroliagis in Algorithmic Aspects of Cloud Computing
    Conference paper 2024
  13. Adaptive key partitioning in distributed stream processing

    In stream processing systems, Key Grou** is a commonly employed partitioning scheme for distributing input tuples among parallel instances of...

    Gang Liu, Zeting Wang, ... Rui Mao in CCF Transactions on High Performance Computing
    Article Open access 12 January 2024
  14. A Privacy-Preserving Distributed Machine Learning Protocol Based on Homomorphic Hash Authentication

    Privacy-preserving machine learning is a hot topic in Artificial Intelligence (AI) area. However, there are also many security issues in all stages...
    Yang Hong, Lisong Wang, ... Rui Zhang in Network and System Security
    Conference paper 2022
  15. A multi-instance cancelable fingerprint biometric based secure session key agreement protocol employing elliptic curve cryptography and a double hash function

    The generation of cryptographic keys using the biometric features of both communicating parties throughout the sessions of communication avoids the...

    Arpita Sarkar, Binod K. Singh in Multimedia Tools and Applications
    Article 05 September 2020
  16. Verifiable speech retrieval algorithm based on diversity security template and biohashing

    In order to solve the problem of leakage in biometrics, to improve the performance of speech retrieval and the security of single biometric template,...

    Yuan Zhang, Yi-bo Huang, ... Qiu-yu Zhang in Multimedia Tools and Applications
    Article 17 March 2023
  17. Distributed Logging Service with Distributed Hash Table for Cloud

    The logging service on cloud is a critical component for administrators who maintain applications and solutions for end users. The service is usually...
    Conference paper 2020
  18. Securing cloud access with enhanced attribute-based cryptography

    With technological advancements and increasing globalization, cloud computing has emerged as one of the most favoured environments for managing and...

    Ashutosh Kumar, Garima Verma in Computing
    Article 26 August 2023
  19. An Image Hashing Algorithm Based on a Convolutional Neural Network

    Abstract

    The purpose is to develop an image hashing algorithm using convolutional neural networks. The proposed algorithm consists of three phases:...

    O. V. Kulikova, G. S. Dombayan in Programming and Computer Software
    Article 28 November 2022
  20. Bounds for c-Ideal Hashing

    In this paper, we analyze hashing from a worst-case perspective. To this end, we study a new property of hash families that is strongly related to...
    Fabian Frei, David Wehner in Fundamentals of Computation Theory
    Conference paper 2023
Did you find what you were looking for? Share feedback.