Results 281 to 290 of about 94,016 (314)
Some of the next articles are maybe not open access.

To hash or not to hash: A security assessment of CSP’s unsafe-hashes expression

2022 IEEE Security and Privacy Workshops (SPW), 2022
More and more people use the Web on a daily basis. We use it for communicating, doing bank transactions, and entertainment. This popularity of the Web has made it one of the main targets of attacks, most prominently Cross-Site Scripting (XSS). To mitigate the effect of those attacks, the prevalence of the Content Security Policy (CSP) is increasing ...
Stolz, Peter   +2 more
openaire   +1 more source

Nonoblivious hashing

Journal of the ACM, 1988
Nonoblivious hashing, where information gathered from unsuccessful probes is used to modify subsequent probe strategy, is introduced and used to obtain the following results for static lookup on full tables: (1) An O (1)-time worst-case ...
Alan Siegel   +3 more
openaire   +4 more sources

Adaptive hashing

Information Systems, 1988
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Alan L. Tharp, Yeong-Shou Hsiao
openaire   +3 more sources

MRD Hashing

Designs, Codes and Cryptography, 2005
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
C. Charnes, R. Safavi-Naini
openaire   +2 more sources

Hashing practice: analysis of hashing and universal hashing

ACM SIGMOD Record, 1988
Much of the literature on hashing deals with overflow handling (collision resolution) techniques and its analysis. What does all the analytical results mean in practice and how can they be achieved with practical files? This paper considers the problem of achieving analytical performance of hashing techniques in practice with reference to successful ...
openaire   +2 more sources

Load Balancing Hashing in Geographic Hash Tables

IEEE Transactions on Parallel and Distributed Systems, 2012
In this paper, we address the problem of balancing the network traffic load when the data generated in a wireless sensor network is stored on the sensor node themselves, and accessed through querying a geographic hash table. Existing approaches allow balancing network load by changing the georouting protocol used to forward queries in the geographic ...
Renda Elena, Resta Giovanni, Santi Paolo
openaire   +3 more sources

Hashing revisited

ACM SIGCSE Bulletin, 2002
Hashing is a singularly important technique for building efficient data structures. Unfortunately, the topic has been poorly understood historically, and recent developments in the practice of hashing have not yet found their way into textbooks.This paper revisits the theory and practice of hashing in a modern light, relates our teaching experiences ...
openaire   +2 more sources

Home - About - Disclaimer - Privacy