Results 41 to 50 of about 647,966 (230)

A Secure Blockchain-Based Authentication and Key Agreement Scheme for 3GPP 5G Networks

open access: yesSensors, 2022
The futuristic fifth-generation cellular network (5G) not only supports high-speed internet, but must also connect a multitude of devices simultaneously without compromising network security.
Man Chun Chow, Maode Ma
doaj   +1 more source

MQF and buffered MQF: quotient filters for efficient storage of k-mers with their counts and metadata

open access: yesBMC Bioinformatics, 2021
Background Specialized data structures are required for online algorithms to efficiently handle large sequencing datasets. The counting quotient filter (CQF), a compact hashtable, can efficiently store k-mers with a skewed distribution.
Moustafa Shokrof   +2 more
doaj   +1 more source

A Lightweight Three-Factor Authentication Scheme for WHSN Architecture

open access: yesSensors, 2020
Wireless Healthcare Sensor Network (WHSN) is a benchmarking technology deployed to levitate the quality of lives for the patients and doctors. WHSN systems must fit IEEE 802.15.6 standard for specific application criteria, unlike some standard criteria ...
Abdullah M. Almuhaideb   +1 more
doaj   +1 more source

A novel subset-based polynomial design for enhancing the security of short message-digest with inflated avalanche and random responses

open access: yesJournal of King Saud University: Computer and Information Sciences, 2023
The data breach and the integrity violation of remote data remain significant issues in the domain of information security. A provably-secure hash function aids in providing solutions to integrity-related issues.
P. Karthik   +5 more
doaj  

On perfect hashing of numbers with sparse digit representation via multiplication by a constant [PDF]

open access: yes, 2011
Consider the set of vectors over a field having non-zero coefficients only in a fixed sparse set and multiplication defined by convolution, or the set of integers having non-zero digits (in some base $b$) in a fixed sparse set.
Monge, Maurizio
core   +2 more sources

Distributing hash families with few rows [PDF]

open access: yesTheoret. Comput. Sci. 800 (2019), 31-41, 2021
Column replacement techniques for creating covering arrays rely on the construction of perfect and distributing hash families with few rows, having as many columns as possible for a specified number of symbols. To construct distributing hash families in which the number of rows is less than the strength, we examine a method due to Blackburn and extend ...
arxiv   +1 more source

Optimization of Tree Modes for Parallel Hash Functions: A Case Study [PDF]

open access: yes, 2017
This paper focuses on parallel hash functions based on tree modes of operation for an inner Variable-Input-Length function. This inner function can be either a single-block-length (SBL) and prefix-free MD hash function, or a sponge-based hash function ...
Atighehchi, Kevin, Rolland, Robert
core   +1 more source

A Simulated Annealing Algorithm to Construct Covering Perfect Hash Families

open access: yesMathematical Problems in Engineering, 2018
Covering perfect hash families (CPHFs) are combinatorial designs that represent certain covering arrays in a compact way. In previous works, CPHFs have been constructed using backtracking, tabu search, and greedy algorithms.
J. Torres-JimĂ©nez   +1 more
semanticscholar   +1 more source

Secret sharing scheme based on hashing [PDF]

open access: yesarXiv, 2023
We propose an adaptive threshold multi secret sharing scheme based solely on cryptographically secure hash functions. We show that the proposed scheme is also: perfect, ideal, verifiable, and proactive. Moreover the proposed scheme has a low computational complexity comparing to the most common schemes operating over finite fields.
arxiv  

Home - About - Disclaimer - Privacy