Results 91 to 100 of about 154,141 (333)

Hash function requirements for Schnorr signatures

open access: yesJournal of Mathematical Cryptology, 2009
We provide two necessary conditions on hash functions for the Schnorr signature scheme to be secure, assuming compact group representations such as those which occur in elliptic curve groups. We also show, via an argument in the generic group model, that
Neven Gregory   +2 more
doaj   +1 more source

XML data integrity based on concatenated hash function [PDF]

open access: yes, 2009
Data integrity is the fundamental for data authentication. A major problem for XML data authentication is that signed XML data can be copied to another document but still keep signature valid. This is caused by XML data integrity protecting.
Liu, B, Lu, J, Yip, YJ
core  

Video retrieval based on deep convolutional neural network

open access: yes, 2017
Recently, with the enormous growth of online videos, fast video retrieval research has received increasing attention. As an extension of image hashing techniques, traditional video hashing methods mainly depend on hand-crafted features and transform the ...
Dong, Yj, Li, JG
core   +1 more source

It's Not Just What You Say, but How You Say It: The Effects of Enterprise Social Media on Service Management, Through the Lens of Signaling Theory

open access: yesHuman Resource Management, EarlyView.
ABSTRACT Frontline service workers are crucial to service delivery and have been a long‐standing focus of research, with scholars and practitioners alike maintaining an interest in their effective management. As technology increasingly transforms this context, the way in which managers in service organizations communicate with frontline workers has ...
Alexandra Budjanovcanin, Wei‐Ning Yang
wiley   +1 more source

A hitchhiker's guide to single‐cell epigenomics: Methods and applications for cancer research

open access: yesInternational Journal of Cancer, EarlyView.
Abstract Genetic mutations are well known to influence tumorigenesis, tumor progression, treatment response and relapse, but the role of epigenetic variation in cancer progression is still largely unexplored. The lack of epigenetic understanding in cancer evolution is in part due to the limited availability of methods to examine such a heterogeneous ...
Marta Moreno‐Gonzalez   +2 more
wiley   +1 more source

Development of a New Post-Quantum Digital Signature Algorithm: Syrga-1

open access: yesComputers
The distinguishing feature of hash-based algorithms is their high confidence in security. When designing electronic signature schemes, proofs of security reduction to certain properties of cryptographic hash functions are used.
Kunbolat Algazy   +3 more
doaj   +1 more source

De Novo Whole Genome Assemblies of Unusual Case‐Making Caddisflies (Trichoptera) Highlight Genomic Convergence in the Composition of the Major Silk Gene (h‐fibroin)

open access: yesJournal of Experimental Zoology Part B: Molecular and Developmental Evolution, EarlyView.
The major silk gene, h‐fibroin, was annotated in high‐quality genomes of two unusual case‐making Trichoptera. H‐Fibroin of Limnocentropus insolitus shows a similar amino acid composition to other case‐making species, while the amino acid composition of h‐fibroin of Phryganopsyche brunnea resembles that of retreat‐making species.
Xiling Deng   +4 more
wiley   +1 more source

Terminal power control method of power line carrier communication network based on adaptive hash function

open access: yesDianxin kexue, 2023
In the control of network terminal power, due to the overall low analysis of network state, the adaptive regulation ability of communication network terminal power is poor.Therefore, the power line carrier communication network terminal power control ...
Hong XUE   +4 more
doaj   +2 more sources

GPERF : a perfect hash function generator [PDF]

open access: yes, 1992
gperf is a widely available perfect hash function generator written in C++. It automates a common system software operation: keyword recognition. gperf translates an n element user-specified keyword list keyfile into source code containing a k element ...
Schmidt, Douglas C., Suda, Tatsuya
core  

Hash‐One: a lightweight cryptographic hash function

open access: yesIET Information Security, 2016
The increased demand for lightweight applications has triggered the need for appropriate security mechanisms in them. Lightweight cryptographic hash functions are among the major responses toward such a requirement. The authors thus have a handful of such hash functions such as QUARK, PHOTON, SPONGENT and GLUON introduced already.
Chungath Srinivasan   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy