Results 281 to 290 of about 94,016 (314)
Some of the next articles are maybe not open access.
To hash or not to hash: A security assessment of CSP’s unsafe-hashes expression
2022 IEEE Security and Privacy Workshops (SPW), 2022More and more people use the Web on a daily basis. We use it for communicating, doing bank transactions, and entertainment. This popularity of the Web has made it one of the main targets of attacks, most prominently Cross-Site Scripting (XSS). To mitigate the effect of those attacks, the prevalence of the Content Security Policy (CSP) is increasing ...
Stolz, Peter +2 more
openaire +1 more source
Journal of the ACM, 1988
Nonoblivious hashing, where information gathered from unsuccessful probes is used to modify subsequent probe strategy, is introduced and used to obtain the following results for static lookup on full tables: (1) An O (1)-time worst-case ...
Alan Siegel +3 more
openaire +4 more sources
Nonoblivious hashing, where information gathered from unsuccessful probes is used to modify subsequent probe strategy, is introduced and used to obtain the following results for static lookup on full tables: (1) An O (1)-time worst-case ...
Alan Siegel +3 more
openaire +4 more sources
Information Systems, 1988
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Alan L. Tharp, Yeong-Shou Hsiao
openaire +3 more sources
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Alan L. Tharp, Yeong-Shou Hsiao
openaire +3 more sources
Designs, Codes and Cryptography, 2005
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
C. Charnes, R. Safavi-Naini
openaire +2 more sources
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
C. Charnes, R. Safavi-Naini
openaire +2 more sources
Hashing practice: analysis of hashing and universal hashing
ACM SIGMOD Record, 1988Much of the literature on hashing deals with overflow handling (collision resolution) techniques and its analysis. What does all the analytical results mean in practice and how can they be achieved with practical files? This paper considers the problem of achieving analytical performance of hashing techniques in practice with reference to successful ...
openaire +2 more sources
Load Balancing Hashing in Geographic Hash Tables
IEEE Transactions on Parallel and Distributed Systems, 2012In this paper, we address the problem of balancing the network traffic load when the data generated in a wireless sensor network is stored on the sensor node themselves, and accessed through querying a geographic hash table. Existing approaches allow balancing network load by changing the georouting protocol used to forward queries in the geographic ...
Renda Elena, Resta Giovanni, Santi Paolo
openaire +3 more sources
ACM SIGCSE Bulletin, 2002
Hashing is a singularly important technique for building efficient data structures. Unfortunately, the topic has been poorly understood historically, and recent developments in the practice of hashing have not yet found their way into textbooks.This paper revisits the theory and practice of hashing in a modern light, relates our teaching experiences ...
openaire +2 more sources
Hashing is a singularly important technique for building efficient data structures. Unfortunately, the topic has been poorly understood historically, and recent developments in the practice of hashing have not yet found their way into textbooks.This paper revisits the theory and practice of hashing in a modern light, relates our teaching experiences ...
openaire +2 more sources

