Results 31 to 40 of about 44,364 (200)
A Lightweight Three-Factor Authentication Scheme for WHSN Architecture
Wireless Healthcare Sensor Network (WHSN) is a benchmarking technology deployed to levitate the quality of lives for the patients and doctors. WHSN systems must fit IEEE 802.15.6 standard for specific application criteria, unlike some standard criteria ...
Abdullah M. Almuhaideb +1 more
doaj +1 more source
Quicksort, Largest Bucket, and Min-Wise Hashing with Limited Independence [PDF]
Randomized algorithms and data structures are often analyzed under the assumption of access to a perfect source of randomness. The most fundamental metric used to measure how "random" a hash function or a random number generator is, is its independence ...
A. Siegel +7 more
core +2 more sources
Fast and Scalable Minimal Perfect Hashing for Massive Key Sets [PDF]
Minimal perfect hash functions provide space-efficient and collision-free hashing on static sets. Existing algorithms and implementations that build such functions have practical limitations on the number of input elements they can process, due to high ...
Chikhi, Rayan +3 more
core +3 more sources
In the article is developing new theoretical approaches to the construction of the concept of active security on the points of an elliptic curve, which are based on the new scheme of perfect secret sharing on the points of an elliptic curve, permit the ...
Nikolay Ivanovich Chervyakov +4 more
doaj
Optimization of Tree Modes for Parallel Hash Functions: A Case Study [PDF]
This paper focuses on parallel hash functions based on tree modes of operation for an inner Variable-Input-Length function. This inner function can be either a single-block-length (SBL) and prefix-free MD hash function, or a sponge-based hash function ...
Atighehchi, Kevin, Rolland, Robert
core +1 more source
Linear time Constructions of some $d$-Restriction Problems [PDF]
We give new linear time globally explicit constructions for perfect hash families, cover-free families and separating hash ...
Bshouty, Nader H.
core +1 more source
A new lattice-based password authenticated key exchange scheme with anonymity and reusable key [PDF]
In this article, we propose a novel bilateral generalization inhomogenous short integer solution (BiGISIS)-based password-authenticated key exchange (PAKE) scheme for post-quantum era security.
Kübra Seyhan, Sedat Akleylek
doaj +2 more sources
Parallel Recursive State Compression for Free [PDF]
This paper focuses on reducing memory usage in enumerative model checking, while maintaining the multi-core scalability obtained in earlier work. We present a tree-based multi-core compression method, which works by leveraging sharing among sub-vectors ...
A. Laarman +14 more
core +6 more sources
Simple, compact and robust approximate string dictionary [PDF]
This paper is concerned with practical implementations of approximate string dictionaries that allow edit errors. In this problem, we have as input a dictionary $D$ of $d$ strings of total length $n$ over an alphabet of size $\sigma$.
Belazzougui, Djamal, Chegrane, Ibrahim
core +1 more source
Parallel Evaluation of Multi-join Queries [PDF]
A number of execution strategies for parallel evaluation of multi-join queries have been proposed in the literature. In this paper we give a comparative performance evaluation of four execution strategies by implementing all of them on the same parallel ...
America R +17 more
core +9 more sources

