Results 91 to 100 of about 118,403 (212)

Finding and Applying Perfect Hash Functions

open access: yesApplied Mathematics Letters, 1988
openaire   +1 more source

Resilient cybersecurity in smart grid ICS communication using BLAKE3-driven dynamic key rotation and intrusion detection. [PDF]

open access: yesSci Rep
Dokku NS   +5 more
europepmc   +1 more source

An O(n log n) Algorithm for Finding Minimal Perfect Hash Functions [PDF]

open access: green, 2013
Edward A. Fox, Lenwood S. Heath, Qi Chen
openalex  

Home - About - Disclaimer - Privacy