Results 31 to 40 of about 20,342 (243)

Quantum Collision Resistance of Double-Block-Length Hashing

open access: bronzeIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Shoichi Hirose, Hidenori KUWAKADO
openalex   +3 more sources

Balancing Accuracy and Privacy in Federated Queries of Clinical Data Repositories: Algorithm Development and Validation

open access: yesJournal of Medical Internet Research, 2020
BackgroundOver the past decade, the emergence of several large federated clinical data networks has enabled researchers to access data on millions of patients at dozens of health care organizations.
Yu, Yun William, Weber, Griffin M
doaj   +1 more source

Approximately Minwise Independence with Twisted Tabulation [PDF]

open access: yes, 2014
A random hash function $h$ is $\varepsilon$-minwise if for any set $S$, $|S|=n$, and element $x\in S$, $\Pr[h(x)=\min h(S)]=(1\pm\varepsilon)/n$. Minwise hash functions with low bias $\varepsilon$ have widespread applications within similarity estimation.
A. Broder   +6 more
core   +1 more source

Optimized Entanglement Purification [PDF]

open access: yes, 2019
We investigate novel protocols for entanglement purification of qubit Bell pairs. Employing genetic algorithms for the design of the purification circuit, we obtain shorter circuits achieving higher success rates and better final fidelities than what is ...
Albert, Victor V.   +2 more
core   +2 more sources

Chameleon: a Blind Double Trapdoor Hash Function for Securing AMI Data Aggregation [PDF]

open access: yes, 2018
Data aggregation is an integral part of Advanced Metering Infrastructure (AMI) deployment that is implemented by the concentrator. Data aggregation reduces the number of transmissions, thereby reducing communication costs and increasing the bandwidth ...
Keoh, Sye Loong   +5 more
core   +1 more source

A Standalone FPGA-based Miner for Lyra2REv2 Cryptocurrencies

open access: yes, 2020
Lyra2REv2 is a hashing algorithm that consists of a chain of individual hashing algorithms, and it is used as a proof-of-work function in several cryptocurrencies.
Balatsoukas-Stimming, Alexios   +4 more
core   +2 more sources

The Stability and the Security of the Tangle [PDF]

open access: yes, 2019
In this paper we study the stability and the security of the distributed data structure at the base of the IOTA protocol, called the Tangle. The contribution of this paper is twofold.
Bramas, Quentin
core   +2 more sources

Quantum attacks on Bitcoin, and how to protect against them [PDF]

open access: yes, 2017
The key cryptographic protocols used to secure the internet and financial transactions of today are all susceptible to attack by the development of a sufficiently large quantum computer.
Aggarwal, Divesh   +4 more
core   +3 more sources

Palm-Print Pattern Matching Based on Features Using Rabin-Karp for Person Identification

open access: yesThe Scientific World Journal, 2015
Palm-print based individual identification is regarded as an effectual method for identifying persons with high confidence. Palm-print with larger inner surface of hand contains many features such as principle lines, ridges, minutiae points, singular ...
S. Kanchana, G. Balakrishnan
doaj   +1 more source

Scalable distributed event detection for Twitter [PDF]

open access: yes, 2013
Social media streams, such as Twitter, have shown themselves to be useful sources of real-time information about what is happening in the world.
Macdonald, Craig   +4 more
core   +2 more sources

Home - About - Disclaimer - Privacy