Results 11 to 20 of about 55,204 (231)

Enabling Dynamic Querying over Distributed Hash Tables [PDF]

open access: yesJournal of Parallel and Distributed Computing, 2010
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
TALIA, Domenico, TRUNFIO, Paolo
openaire   +3 more sources

A Blockchain-Based End-to-End Data Protection Model for Personal Health Records Sharing: A Fully Homomorphic Encryption Approach

open access: yesSensors, 2022
Personal health records (PHR) represent health data managed by a specific individual. Traditional solutions rely on centralized architectures to store and distribute PHR, which are more vulnerable to security breaches.
Fausto Neri da Silva Vanin   +6 more
doaj   +1 more source

Comparative Analysis of Decentralized Identity Approaches

open access: yesIEEE Access, 2022
Decentralization is essential when trust and performance must not depend on a single organization. Distributed Ledger Technologies (DLTs) and Decentralized Hash Tables (DHTs) are examples where the DLT is useful for transactional events, and the DHT is ...
Morteza Alizadeh   +2 more
doaj   +1 more source

Weighted distributed hash tables [PDF]

open access: yesProceedings of the seventeenth annual ACM symposium on Parallelism in algorithms and architectures, 2005
We present two methods for weighted consistent hashing also known as weighted distributed hash tables. The first method, called Linear Method, combines the standard consistent hasing introduced by Karger et al. [9] with a linear weighted distance measure.
Christian Schindelhauer   +1 more
openaire   +1 more source

Authentication in stealth distributed hash tables [PDF]

open access: yesJournal of Systems Architecture, 2006
Most existing DHT algorithms assume that all nodes have equal capabilities. This assumption has previously been shown to be untrue in real deployments, where the heterogeneity of nodes can actually have a detrimental effect upon performance. In this paper, we acknowledge that nodes on the same overlay may also differ in terms of their trustworthiness ...
MacQuire, Andrew   +4 more
openaire   +3 more sources

Fast distributed video deduplication via locality-sensitive hashing with similarity ranking

open access: yesEURASIP Journal on Image and Video Processing, 2019
The exponentially growing amount of video data being produced has led to tremendous challenges for video deduplication technology. Nowadays, many different deduplication approaches are being rapidly developed, but they are generally slow and their ...
Yeguang Li, Liang Hu, Ke Xia, Jie Luo
doaj   +1 more source

Complex queries over decentralised systems for geodata retrieval

open access: yesIET Networks, 2023
Decentralised systems have been proved to be quite effective to allow for trusted and accountable data sharing, without the need to resort to a centralised party that collects all the information.
Mirko Zichichi   +3 more
doaj   +1 more source

User privacy prevention model using supervised federated learning‐based block chain approach for internet of Medical Things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan   +7 more
wiley   +1 more source

P3OI-MELSH: Privacy Protection Target Point of Interest Recommendation Algorithm Based on Multi-Exploring Locality Sensitive Hashing

open access: yesFrontiers in Neurorobotics, 2021
With the rapid development of social network, intelligent terminal and automatic positioning technology, location-based social network (LBSN) service has become an important and valuable application. Point of interest (POI) recommendation is an important
Desheng Liu   +5 more
doaj   +1 more source

Packet Classification Using GPU and One-Level Entropy-Based Hashing

open access: yesIEEE Access, 2020
The demand for on-line analyzing of internet traffic for both security and QoS consideration directly increases as a function of using diverse applications and as malicious attacks increase.
Shlomo Greenberg   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy