Results 31 to 40 of about 118,403 (212)

MQF and buffered MQF: quotient filters for efficient storage of k-mers with their counts and metadata

open access: yesBMC Bioinformatics, 2021
Background Specialized data structures are required for online algorithms to efficiently handle large sequencing datasets. The counting quotient filter (CQF), a compact hashtable, can efficiently store k-mers with a skewed distribution.
Moustafa Shokrof   +2 more
doaj   +1 more source

A Secure Blockchain-Based Authentication and Key Agreement Scheme for 3GPP 5G Networks

open access: yesSensors, 2022
The futuristic fifth-generation cellular network (5G) not only supports high-speed internet, but must also connect a multitude of devices simultaneously without compromising network security.
Man Chun Chow, Maode Ma
doaj   +1 more source

Analyzing execution path non-determinism of the Linux kernel in different scenarios

open access: yesConnection Science, 2023
Safety-critical systems play a significant role in industrial domains, and their complexity is increasing with advanced technologies such as Artificial Intelligence (AI).
Yucong Chen   +5 more
doaj   +1 more source

A Lightweight Three-Factor Authentication Scheme for WHSN Architecture

open access: yesSensors, 2020
Wireless Healthcare Sensor Network (WHSN) is a benchmarking technology deployed to levitate the quality of lives for the patients and doctors. WHSN systems must fit IEEE 802.15.6 standard for specific application criteria, unlike some standard criteria ...
Abdullah M. Almuhaideb   +1 more
doaj   +1 more source

Quicksort, Largest Bucket, and Min-Wise Hashing with Limited Independence [PDF]

open access: yes, 2015
Randomized algorithms and data structures are often analyzed under the assumption of access to a perfect source of randomness. The most fundamental metric used to measure how "random" a hash function or a random number generator is, is its independence ...
A. Siegel   +7 more
core   +2 more sources

Fast and Scalable Minimal Perfect Hashing for Massive Key Sets [PDF]

open access: yes, 2017
Minimal perfect hash functions provide space-efficient and collision-free hashing on static sets. Existing algorithms and implementations that build such functions have practical limitations on the number of input elements they can process, due to high ...
Chikhi, Rayan   +3 more
core   +3 more sources

ALGEBRAIC AND PRACTICAL ASPECTS OF THE IMPLEMENTATION OF THE NEURAL NETWORK THRESHOLD SECRET SHARING SCHEME

open access: yesНаука. Инновации. Технологии, 2022
In the article is developing new theoretical approaches to the construction of the concept of active security on the points of an elliptic curve, which are based on the new scheme of perfect secret sharing on the points of an elliptic curve, permit the ...
Nikolay Ivanovich Chervyakov   +4 more
doaj  

Optimization of Tree Modes for Parallel Hash Functions: A Case Study [PDF]

open access: yes, 2017
This paper focuses on parallel hash functions based on tree modes of operation for an inner Variable-Input-Length function. This inner function can be either a single-block-length (SBL) and prefix-free MD hash function, or a sponge-based hash function ...
Atighehchi, Kevin, Rolland, Robert
core   +1 more source

Linear time Constructions of some $d$-Restriction Problems [PDF]

open access: yes, 2014
We give new linear time globally explicit constructions for perfect hash families, cover-free families and separating hash ...
Bshouty, Nader H.
core   +1 more source

A new lattice-based password authenticated key exchange scheme with anonymity and reusable key [PDF]

open access: yesPeerJ Computer Science
In this article, we propose a novel bilateral generalization inhomogenous short integer solution (BiGISIS)-based password-authenticated key exchange (PAKE) scheme for post-quantum era security.
Kübra Seyhan, Sedat Akleylek
doaj   +2 more sources

Home - About - Disclaimer - Privacy