Search
Search Results
-
Deterministic Hash and Linear Congruential BlowFish Extreme Learning for User Authentication in Cloud Computing
Advanced technology of Cloud Computing (CC) is to provide the services without straight executive of users and demand for resources. It is very...
-
An improved hash algorithm for monitoring network traffic in the internet of things
With the prompt development of network technology, Internet of Things (IoT), and the speedy enhancement of network performance, numerous network...
-
Accelerated Parallel Hybrid GPU/CPU Hash Table Queries with String Keys
GPUs can accelerate hash tables for fast storage and look-ups utilizing their massive parallelism. State-of-the-art GPU hash tables use keys with... -
Table Optimizations
During the life cycle of your data-tier applications, you may need to perform a number of maintenance tasks and performance optimizations against the... -
GPU-Based Dynamic Hyperspace Hash with Full Concurrency
Hyperspace hashing which is often applied to NoSQL data-bases builds indexes by map** objects with multiple attributes to a multidimensional space....
-
Hybrid CPU/GPU/APU accelerated query, insert, update and erase operations in hash tables with string keys
Modern computer systems can use different types of hardware acceleration to achieve massive performance improvements. Some accelerators like FPGA and...
-
Patent Landscape in the field of Hash-Based Post-Quantum Signatures
Post-Quantum Cryptography (PQC) is one of the most fascinating topics of recent developments in cryptography. Following the ongoing standardization... -
Multiprocessing Implementation for Building a DNA q-gram Index Hash Table
Over the past few years, next-generation sequencing has become an invaluable technology for numerous applications in the field of genomics. The... -
A scalable post-quantum hash-based group signature
We present a construction for hash-based one-time group signature schemes, and develop a traceable post-quantum multi-time group signature upon it. A...
-
Efficient Flow Table Caching Architecture and Replacement Policy for SDN Switches
Software-defined networks (SDN) rely on flow tables to forward packets from different flows with different policies. To speed up packet forwarding,...
-
GraphTango: A Hybrid Representation Format for Efficient Streaming Graph Updates and Analysis
Streaming graph processing performs batched updates and analytics on a time-evolving graph. The underlying representation format of the graph largely...
-
Algorithmic Aspects of Distributed Hash Tables on Cloud, Fog, and Edge Computing Applications: A Survey
In the current era, where data is expanding due to the unforeseen volume, velocity, and variety of data types produced by IoT devices, there is an... -
Adaptive key partitioning in distributed stream processing
In stream processing systems, Key Grou** is a commonly employed partitioning scheme for distributing input tuples among parallel instances of...
-
A Privacy-Preserving Distributed Machine Learning Protocol Based on Homomorphic Hash Authentication
Privacy-preserving machine learning is a hot topic in Artificial Intelligence (AI) area. However, there are also many security issues in all stages... -
A multi-instance cancelable fingerprint biometric based secure session key agreement protocol employing elliptic curve cryptography and a double hash function
The generation of cryptographic keys using the biometric features of both communicating parties throughout the sessions of communication avoids the...
-
Verifiable speech retrieval algorithm based on diversity security template and biohashing
In order to solve the problem of leakage in biometrics, to improve the performance of speech retrieval and the security of single biometric template,...
-
Distributed Logging Service with Distributed Hash Table for Cloud
The logging service on cloud is a critical component for administrators who maintain applications and solutions for end users. The service is usually... -
Securing cloud access with enhanced attribute-based cryptography
With technological advancements and increasing globalization, cloud computing has emerged as one of the most favoured environments for managing and...
-
An Image Hashing Algorithm Based on a Convolutional Neural Network
AbstractThe purpose is to develop an image hashing algorithm using convolutional neural networks. The proposed algorithm consists of three phases:...
-
Bounds for c-Ideal Hashing
In this paper, we analyze hashing from a worst-case perspective. To this end, we study a new property of hash families that is strongly related to...