Results 121 to 130 of about 1,628,666 (344)

Fuzzy Identity-Based Dynamic Auditing of Big Data on Cloud Storage

open access: yesIEEE Access, 2019
To ensure the reliability and integrity of data in the cloud storage server, some scholars provided various data integrity auditing schemes. However, the most existing data integrity auditing schemes only support the static data and may be unsuitable for
Chenbin Zhao   +4 more
doaj   +1 more source

Conductive Hydrogel‐Based Neural Interfaces: From Fabrication Methods, Properties, to Applications

open access: yesSmall Structures, EarlyView.
This review summarizes the fabrication methods, properties, and applications of conductive hydrogels in neural interfaces. Finally, the prevailing challenges and outlines of future directions in the field of conductive hydrogels for neural interfaces are provided, emphasizing the need for interdisciplinary research to address issues such as long‐term ...
Xin‐Yu Xue   +10 more
wiley   +1 more source

Lock-free dynamic hash tables with open addressing [PDF]

open access: green, 2004
Hui Gao   +2 more
openalex   +1 more source

Blockchain-powered distributed data auditing scheme for cloud-edge healthcare system

open access: yesCyber Security and Applications, 2023
Cloud-edge healthcare system provides storage and computing functions at the hospital servers, bringing low latency for doctors and patients. However, hospital servers cannot be trusted and have limited computing resources.
Yi Li, Meiqin Tang
doaj  

Fast hash table lookup using extended bloom filter [PDF]

open access: bronze, 2005
Haoyu Song   +3 more
openalex   +1 more source

Efficient end-to-end learning for quantizable representations

open access: yes, 2018
Embedding representation learning via neural networks is at the core foundation of modern similarity based search. While much effort has been put in developing algorithms for learning binary hamming code representations for search efficiency, this still ...
Jeong, Yeonwoo, Song, Hyun Oh
core  

A secured cloud‐medical data sharing with A‐BRSA and Salp ‐Ant Lion Optimisation Algorithm

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Sharing medical data among healthcare providers, researchers, and patients is crucial for efficient healthcare services. Cloud‐assisted smart healthcare (s‐healthcare) systems have made it easier to store EHRs effectively. However, the traditional encryption algorithms used to secure this data can be vulnerable to attacks if the encryption key
Adel Binbusayyis   +7 more
wiley   +1 more source

A Novel Plaintext-Related Image Encryption Algorithm Based on Stochastic Signal Insertion and Block Swapping

open access: yesIEEE Access, 2019
Image encryption is an important method for protecting private data during communication. This paper proposes a novel hyperchaotic image encryption algorithm based on stochastic signal insertion and block permutation. First, the 5D hyperchaotic system is
Shuliang Sun, Yongning Guo, Ruikun Wu
doaj   +1 more source

Stealth distributed hash table [PDF]

open access: green, 2005
Andrew Brampton   +4 more
openalex   +1 more source

Tetris–Hashing or optimal table compression

open access: yesDiscrete Applied Mathematics, 2001
AbstractIn this paper, we present a new method for mapping a static set of n keys, each an integer between 0 and N−1, into a hash table of size n without any collision. Our data structure requires only an additional array of n integers, each less than n, and achieves a worst-case lookup time of O(1).
Klaus Simon   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy