A Monte Carlo study of Cichelli hash-function solvability [PDF]
Raoul Bell, B. N. I. Floyd
openalex +1 more source
Quantitative blood loss values reveal high rates of undiagnosed postpartum hemorrhage
Abstract Objective In this study, we examined quantitative blood loss (QBL) values and postpartum hemorrhage (PPH) diagnoses in relation to clinical, demographic, and hospitalization related variables. Methods A retrospective chart review was conducted of deliveries at a regional hospital over a nine‐month period, querying patient demographics, PPH ...
Burhan A. Khan+6 more
wiley +1 more source
Secured‐KDS: Secret key distribution and authentication scheme for resource‐constrained devices
Abstract In the era of the Internet of things (IoT), billions of electrical devices are connected to the Internet and communicate remotely with one another without any human intervention. IoT devices often do not enforce proper security measures; this raises serious privacy and security concerns.
Selvakumar Manickam, Shafiq Ul Rehman
wiley +1 more source
Development of a New Post-Quantum Digital Signature Algorithm: Syrga-1
The distinguishing feature of hash-based algorithms is their high confidence in security. When designing electronic signature schemes, proofs of security reduction to certain properties of cryptographic hash functions are used.
Kunbolat Algazy+3 more
doaj +1 more source
Multicollision attacks and generalized iterated hash functions
We apply combinatorics on words to develop an approach to multicollisions in generalized iterated hash functions. Our work is based on the discoveries of A. Joux and on generalizations provided by M. Nandi and D. Stinson as well as J. Hoch and A. Shamir.
Kortelainen Juha+2 more
doaj +1 more source
Trigonometric words ranking model for spam message classification
Abstract The significant increase in the volume of fake (spam) messages has led to an urgent need to develop and implement a robust anti‐spam method. Several of the current anti‐spam systems depend mainly on the word order of the message in determining the spam message, which results in the system's inability to predict the correct type of message when
Suha Mohammed Hadi+7 more
wiley +1 more source
Named data network dynamic cache placement strategy based on programmable data plane
A dynamic cache placement strategy is proposed to classify content according to whether is a need for retransmission. And the dynamic cache placement strategy and data plane forwarding function are realized by using the programmable language. Abstract Aiming at the efficiency and implementation of in‐network cache in Named Data Network, an in‐network ...
Saifeng Hou, Yuxiang Hu, Le Tian
wiley +1 more source
An undergraduate project to compute minimal perfect hashing functions [PDF]
John A. Trono
openalex +1 more source
Guest Editorial: Multi‐view representation learning for computer vision
IET Computer Vision, EarlyView.
Xin Ning+5 more
wiley +1 more source
Using Hash Functions as a Hedge against Chosen Ciphertext Attack [PDF]
Victor Shoup
openalex +1 more source