Results 41 to 50 of about 569,401 (216)

DeepCatra: Learning flow‐ and graph‐based behaviours for Android malware detection

open access: yesIET Information Security, Volume 17, Issue 1, Page 118-130, January 2023., 2023
Abstract As Android malware grows and evolves, deep learning has been introduced into malware detection, resulting in great effectiveness. Recent work is considering hybrid models and multi‐view learning. However, they use only simple features, limiting the accuracy of these approaches in practice.
Yafei Wu   +4 more
wiley   +1 more source

‘Lex Cryptographi(c)a,’ ‘Cloud Crypto Land’ or What? – Blockchain Technology on the Legal Hype Cycle

open access: yesThe Modern Law Review, Volume 86, Issue 1, Page 31-66, January 2023., 2023
Based on the reception of DLT/blockchain, this article argues that legal discourse is subject to hype cycle dynamics. Thinking in hype cycle categories provides a structured way for analysing the legal implications of a particular innovation. This critical engagement with enthusiasts, sceptics and pragmatists through the different stages may help to ...
Michael Anderson Schillig
wiley   +1 more source

MOVE GENERATION WITH PERFECT HASH FUNCTIONS [PDF]

open access: yesICGA Journal, 2008
We present two new perfect hashing schemes that can be used for efficient bitboard move generation for sliding pieces in chess-like board games without the need to use rotated bitboards. Moreover, we show that simple variations of these schemes give minimal perfect hashing schemes.
Mark Levene, Trevor Fenner
openaire   +2 more sources

Secure Authentication in the Smart Grid

open access: yesMathematics, 2022
Authenticated key agreement is a process in which protocol participants communicate over a public channel to share a secret session key, which is then used to encrypt data transferred in subsequent communications.
Mehdi Hosseinzadeh   +4 more
doaj   +1 more source

A Secure Blockchain-Based Authentication and Key Agreement Scheme for 3GPP 5G Networks

open access: yesSensors, 2022
The futuristic fifth-generation cellular network (5G) not only supports high-speed internet, but must also connect a multitude of devices simultaneously without compromising network security.
Man Chun Chow, Maode Ma
doaj   +1 more source

Secure big data collection and processing: Framework, means and opportunities

open access: yesJournal of the Royal Statistical Society: Series A (Statistics in Society), Volume 185, Issue 4, Page 1541-1559, October 2022., 2022
Abstract Statistical disclosure control is important for the dissemination of statistical outputs. There is an increasing need for greater confidentiality protection during data collection and processing by National Statistical Offices. In particular, various transactions and remote sensing signals are examples of useful but very detailed big data that
Li‐Chun Zhang, Gustav Haraldsen
wiley   +1 more source

MQF and buffered MQF: quotient filters for efficient storage of k-mers with their counts and metadata

open access: yesBMC Bioinformatics, 2021
Background Specialized data structures are required for online algorithms to efficiently handle large sequencing datasets. The counting quotient filter (CQF), a compact hashtable, can efficiently store k-mers with a skewed distribution.
Moustafa Shokrof   +2 more
doaj   +1 more source

A Lightweight Three-Factor Authentication Scheme for WHSN Architecture

open access: yesSensors, 2020
Wireless Healthcare Sensor Network (WHSN) is a benchmarking technology deployed to levitate the quality of lives for the patients and doctors. WHSN systems must fit IEEE 802.15.6 standard for specific application criteria, unlike some standard criteria ...
Abdullah M. Almuhaideb   +1 more
doaj   +1 more source

PTHash: Revisiting FCH Minimal Perfect Hashing [PDF]

open access: yes, 2021
Given a set S of n distinct keys, a function f that bijectively maps the keys of S into the range (0,...,n-1) is called a minimal perfect hash function for S.
Pibiri G. E., Trani R.
core   +2 more sources

A novel subset-based polynomial design for enhancing the security of short message-digest with inflated avalanche and random responses

open access: yesJournal of King Saud University: Computer and Information Sciences, 2023
The data breach and the integrity violation of remote data remain significant issues in the domain of information security. A provably-secure hash function aids in providing solutions to integrity-related issues.
P. Karthik   +5 more
doaj  

Home - About - Disclaimer - Privacy