Results 61 to 70 of about 123,825 (281)

JAVASCRIPT SECURITY USING CRYPTOGRAPHIC HASH FUNCTIONS

open access: yesСучасні інформаційні системи, 2019
The subject of this research is the development of methods of protection against attacks on third-party JavaScript and the document object model (DOM).
Irada Rahimova   +3 more
doaj   +1 more source

Leftover Hashing Against Quantum Side Information

open access: yes, 2010
The Leftover Hash Lemma states that the output of a two-universal hash function applied to an input with sufficiently high entropy is almost uniformly random.
Renner, Renato   +3 more
core   +1 more source

Accelerating Primary Screening of USP8 Inhibitors from Drug Repurposing Databases with Tree‐Based Machine Learning

open access: yesAdvanced Intelligent Discovery, EarlyView.
This study introduces a tree‐based machine learning approach to accelerate USP8 inhibitor discovery. The best‐performing model identified 100 high‐confidence repurposable compounds, half already approved or in clinical trials, and uncovered novel scaffolds not previously studied. These findings offer a solid foundation for rapid experimental follow‐up,
Yik Kwong Ng   +4 more
wiley   +1 more source

Grayscale Image Authentication using Neural Hashing

open access: yes, 2016
Many different approaches for neural network based hash functions have been proposed. Statistical analysis must correlate security of them. This paper proposes novel neural hashing approach for gray scale image authentication.
Kutlu, Yakup, Yayık, Apdullah
core   +2 more sources

Zero Watermarking Using Convolutional Additive Self‐Attention Vision Transformer and Discrete Wavelet Transform‐Variance‐Based Feature Descriptor for Medical Image Security in Mobile Healthcare Services

open access: yesAdvanced Intelligent Systems, EarlyView.
A zero‐watermarking algorithm that combines a refined convolutional additive self‐attention vision transformer (CAS‐ViT) with a discrete wavelet transform variance‐based feature descriptor (DVFD) is proposed for protecting the privacy of medical images in mobile healthcare services.
Pei Liu   +6 more
wiley   +1 more source

Efficient Implementation of Lightweight Hash Functions on GPU and Quantum Computers for IoT Applications

open access: yesIEEE Access, 2022
Secure communication is important for Internet of Things (IoT) applications, to avoid cyber-security attacks. One of the key security aspects is data integrity, which can be protected by employing cryptographic hash functions.
Wai-Kong Lee   +5 more
doaj   +1 more source

Material‐Based Intelligence: Autonomous Adaptation and Embodied Computation in Physical Substrates

open access: yesAdvanced Intelligent Systems, EarlyView.
This perspective formulates a unifying framework for Material‐Based Intelligence (MBI), defining the physical requirements for materials to achieve embodied action, active memory and embodied information processing through intrinsic nonequilibrium dynamics. The design of intelligent materials often draws parallels with the complex adaptive behaviors of
Vladimir A. Baulin   +4 more
wiley   +1 more source

A Fast Single-Key Two-Level Universal Hash Function

open access: yesIACR Transactions on Symmetric Cryptology, 2017
Universal hash functions based on univariate polynomials are well known, e.g. Poly1305 and GHASH. Using Horner’s rule to evaluate such hash functionsrequire l − 1 field multiplications for hashing a message consisting of l blocks where each block is one ...
Debrup Chakraborty   +2 more
doaj   +1 more source

Deep Semantic Ranking Based Hashing for Multi-Label Image Retrieval

open access: yes, 2015
With the rapid growth of web images, hashing has received increasing interests in large scale image retrieval. Research efforts have been devoted to learning compact binary codes that preserve semantic similarity based on labels.
Huang, Yongzhen   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy