Results 61 to 70 of about 10,638,853 (320)

Comparison of hash function algorithms against attacks: A review

open access: yes, 2018
Hash functions are considered key components of nearly all cryptographic protocols, as well as of many security applications such as message authentication codes, data integrity, password storage, and random number generation.
Ali Maetouq   +5 more
semanticscholar   +1 more source

Leveraging 3D Molecular Spatial Visual Information and Multi‐Perspective Representations for Drug Discovery

open access: yesAdvanced Science, EarlyView.
A deep learning framework called MolVisGNN is proposed to fuse 3D molecular visual information of drugs with multi‐source features, which proves the importance of 3D molecular visual information of drugs and the advancedness of this model in the field of drug discovery, and provides a reference for how to more comprehensively express small molecule ...
Zimai Zhang   +9 more
wiley   +1 more source

Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network

open access: yesIET Networks, EarlyView., 2022
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley   +1 more source

Methodologies for Sample Multiplexing and Computational Deconvolution in Single‐Cell Sequencing

open access: yesAdvanced Science, EarlyView.
Sample multiplexing offers a critical solution for boosting throughput and minimizing batch effects in single‐cell sequencing. This review navigates the latest experimental methodologies and computational deconvolution algorithms, bridging the gap between wet‐lab design and analytical success.
Yufei Gao, Weiwei Yin, Wei Hu, Wei Chen
wiley   +1 more source

Trigonometric words ranking model for spam message classification

open access: yesIET Networks, EarlyView., 2022
Abstract The significant increase in the volume of fake (spam) messages has led to an urgent need to develop and implement a robust anti‐spam method. Several of the current anti‐spam systems depend mainly on the word order of the message in determining the spam message, which results in the system's inability to predict the correct type of message when
Suha Mohammed Hadi   +7 more
wiley   +1 more source

The Lane hash function [PDF]

open access: yes, 2009
We propose the cryptographic hash function Lane as a candidate for the SHA-3 competition organised by NIST. Lane is an iterated hash function supporting multiple digest sizes. Components of the AES block cipher are reused as building blocks. Lane aims to
  +7 more
core   +1 more source

Protocol‐Agnostic Meta Key Distribution for Encrypted Wireless Communications Enabled by Space‐Time‐Coding Metasurface

open access: yesAdvanced Science, EarlyView.
This paper presents a programmable metasurface‐based Meta Key Distribution (MKD) system for secure, protocol‐independent key exchange in indoor wireless settings. By embedding entropy into the wireless channel, it enables lightweight, compatible cryptographic key generation.
Xinyu Li   +7 more
wiley   +1 more source

Fully Integrated Passive UHF RFID Tag for Hash-Based Mutual Authentication Protocol

open access: yesThe Scientific World Journal, 2015
Passive radio-frequency identification (RFID) tag has been used in many applications. While the RFID market is expected to grow, concerns about security and privacy of the RFID tag should be overcome for the future use.
Shugo Mikami   +3 more
doaj   +1 more source

Post-quantum hash functions using $\mathrm{SL}_n(\mathbb{F}_p)$ [PDF]

open access: green, 2022
Corentin Le Coz   +4 more
openalex   +1 more source

Hashing for Similarity Search: A Survey [PDF]

open access: yes, 2014
Similarity search (nearest neighbor search) is a problem of pursuing the data items whose distances to a query item are the smallest from a large database.
Ji, Jianqiu   +3 more
core  

Home - About - Disclaimer - Privacy