Results 141 to 150 of about 10,475,631 (365)
Refined repetitive sequence searches utilizing a fast hash function and cross species information retrievals [PDF]
Jeff Reneker, Chi‐Ren Shyu
openalex +1 more source
ABSTRACT Medical images play a crucial role in diagnosis, treatment procedures and overall healthcare. Nevertheless, they also pose substantial risks to patient confidentiality and safety. Safeguarding the confidentiality of patients' data has become an urgent and practical concern.
Mohamed Meselhy Eltoukhy+3 more
wiley +1 more source
Revocable policy-based chameleon hash using lattices
A chameleon hash function is a type of hash function that involves a trapdoor to help find collisions, i.e., it allows the rewriting of a message without modifying the hash.
Klamti Jean Belo, Hasan Mohammed Anwarul
doaj +1 more source
A Security Analysis of Double-Block-Length Hash Functions with the Rate 1 [PDF]
Shoichi Hirose
openalex +1 more source
IP address lookup using a dynamic hash function [PDF]
Xiaojun Nie+4 more
openalex +1 more source
Forensic analysis and evaluation of file‐wiping applications in Android OS
Abstract Anti‐forensics refers to techniques designed to obstruct the discovery of evidence in digital forensic investigations. File‐wiping is one of the anti‐forensic techniques that make data recovery impossible by overwriting data with specific patterns. This technique poses significant challenges to investigators.
Dong Bin Oh+6 more
wiley +1 more source
Implementation of a Data-Parallel Approach on a Lightweight Hash Function for IoT Devices
The Internet of Things is used in many application areas in our daily lives. Ensuring the security of valuable data transmitted over the Internet is a crucial challenge.
Abdullah Sevin
doaj +1 more source
wholeskim: Utilising Genome Skims for Taxonomically Annotating Ancient DNA Metagenomes
ABSTRACT Inferring community composition from shotgun sequencing of environmental DNA is highly dependent on the completeness of reference databases used to assign taxonomic information as well as the pipeline used. While the number of complete, fully assembled reference genomes is increasing rapidly, their taxonomic coverage is generally too sparse to
Lucas Elliott+5 more
wiley +1 more source
Can There Be a Two Way Hash Function?
It is computationally impossible for one-way hash functions to obtain the original data again. In this study, Two Way Hash Function (TWHF) is proposed which provides the security properties of one-way hash functions. TWHF aims to hash/encrypt and decrypt
Timucin Koroglu, Refik Samet
doaj +1 more source