Results 21 to 30 of about 19,467 (229)

Securing Financial Transactions with a Robust Algorithm: Preventing Double-Spending Attacks

open access: yesComputers, 2023
A zero-confirmation transaction is a transaction that has not yet been confirmed on the blockchain and is not yet part of the blockchain. The network propagates zero-confirmation transactions quickly, but they are not secured against double-spending ...
Hasan Hashim   +5 more
doaj   +1 more source

load thresholds for cuckoo hashing with double hashing [PDF]

open access: yes16th Scandinavian Symposium and Workshops on Algorithm Theory (SWAT 2018), 2018
In k-ary cuckoo hashing, each of cn objects is associated with k random buckets in a hash table of size n. An l-orientation is an assignment of objects to associated buckets such that each bucket receives at most l objects. Several works have determined load thresholds c^* = c^*(k,l) for k-ary cuckoo hashing; that is, for c c^* no l-orientation ...
Mitzenmacher, Michael   +2 more
openaire   +3 more sources

Frequent Itemset Generation using Double Hashing Technique

open access: goldProcedia Engineering, 2012
AbstractIn data mining, frequent itemsets plays an important role which is used to identify the correlations among the fields of database.In this paper, we propose a new association rule mining algorithm called Double Hashing Based Frequent Itemsets, (DHBFI) in which hashing technology is used to store the database in vertical data format.
N. Jayalakshmi   +3 more
openalex   +3 more sources

Double hashing thresholds via local weak convergence [PDF]

open access: green2013 51st Annual Allerton Conference on Communication, Control, and Computing (Allerton), 2013
A lot of interest has recently arisen in the analysis of multiple-choice "cuckoo hashing" schemes. In this context, a main performance criterion is the load threshold under which the hashing scheme is able to build a valid hashtable with high probability in the limit of large systems; various techniques have successfully been used to answer this ...
Mathieu Leconte
openalex   +5 more sources

POTENTIAL APPLICATION OF HARDWARE PROTECTED SYMMETRIC AUTHENTICATION MICROCIRCUITS TO ENSURE THE SECURITY OF INTERNET OF THINGS

open access: yesСучасні інформаційні системи, 2021
The paper objective is to determine the basic schemes and their characteristics for ensuring the security of Internet of Things nodes using symmetric authentication cryptographic microcircuits.
Petro Klimushin   +3 more
doaj   +1 more source

G-DaM: A Distributed Data Storage with Blockchain Framework for Management of Groundwater Quality Data

open access: yesSensors, 2022
Groundwater overuse in different domains will eventually lead to global freshwater scarcity. To meet the anticipated demands, many governments worldwide are employing innovative and traditional techniques for forecasting groundwater availability by ...
Sukrutha L. T. Vangipuram   +3 more
doaj   +1 more source

Electron contact interlayers for low‐temperature‐processed crystalline silicon solar cells

open access: yesProgress in Photovoltaics: Research and Applications, EarlyView., 2023
In this study, a series of interlayers are trialed as electron‐selective contacts on crystalline silicon, including several materials that were previously untested in this application. Most of these interlayers were found to achieve mΩcm2‐scale specific contact resistivities.
Jesus Ibarra Michel   +11 more
wiley   +1 more source

Deck-Based Wide Block Cipher Modes and an Exposition of the Blinded Keyed Hashing Model

open access: yesIACR Transactions on Symmetric Cryptology, 2020
We present two tweakable wide block cipher modes from doubly-extendable cryptographic keyed (deck) functions and a keyed hash function: double-decker and docked-double-decker.
Aldo Gunsing, Joan Daemen, Bart Mennink
doaj   +1 more source

Some Plausible Constructions of Double-Block-Length Hash Functions [PDF]

open access: bronze, 2006
In this article, it is discussed how to construct a compression function with 2 n-bit output using a component function with n-bit output. The component function is either a smaller compression function or a block cipher. Some constructions are presented which compose collision-resistant hash functions: Any collision-finding attack on them is at most ...
Shoichi Hirose
openalex   +3 more sources

Bipartite Random Graphs and Cuckoo Hashing [PDF]

open access: yesDiscrete Mathematics & Theoretical Computer Science, 2006
The aim of this paper is to extend the analysis of Cuckoo Hashing of Devroye and Morin in 2003. In particular we make several asymptotic results much more precise.
Reinhard Kutzelnigg
doaj   +1 more source

Home - About - Disclaimer - Privacy