Efficient 3D Implicit Head Avatar with Mesh-anchored Hash Table Blendshapes [PDF]
Ziqian Bai+7 more
openalex +1 more source
Two-factor authentication for intellectual property transactions based on improved zero-knowledge proof. [PDF]
Mo S+5 more
europepmc +1 more source
The Bathroom Model: A Realistic Approach to Hash Table Algorithm Optimization [PDF]
Qiantong Wang
openalex +1 more source
A PUF-Based Secure Authentication and Key Agreement Scheme for the Internet of Drones. [PDF]
Choi J, Son S, Kwon D, Park Y.
europepmc +1 more source
An Identity Management Scheme Based on Multi-Factor Authentication and Dynamic Trust Evaluation for Telemedicine. [PDF]
Wu Y, Pang M, Ma J, Ou W, Yue Q, Han W.
europepmc +1 more source
Construction of edit-distance graphs for large sets of short reads through minimizer-bucketing. [PDF]
Ping P, Li J.
europepmc +1 more source
A Dickson polynomial based group key agreement authentication scheme for ensuring conditional privacy preservation and traceability in VANETs. [PDF]
Rajkumar Y, Santhosh Kumar SVN.
europepmc +1 more source
A Random Structure for Optimum Cache Size Distributed hash table (DHT) Peer-to-Peer design
Nima Sarshar, Vwani Roychowdhury
openalex +2 more sources
Dynamic Buffer Management in Massively Parallel Systems: The Power of Randomness. [PDF]
Pham M+6 more
europepmc +1 more source
Blockchain enabled traceability in the jewel supply chain. [PDF]
Patel A+4 more
europepmc +1 more source