Results 161 to 170 of about 18,375 (213)
Assembly and reasoning over semantic mappings at scale for biomedical data integration. [PDF]
Hoyt CT, Karis K, Gyori BM.
europepmc +1 more source
Implementation of a novel secured authentication protocol for cyber security applications. [PDF]
Suresh Kumar V +7 more
europepmc +1 more source
Cascading quantum walks with Chebyshev map for designing a robust medical image encryption algorithm. [PDF]
Alblehai F +3 more
europepmc +1 more source
Image vaccine against steganography in encrypted domain. [PDF]
Li X, Wang Z.
europepmc +1 more source
txci-ATAC-seq: a massive-scale single-cell technique to profile chromatin accessibility. [PDF]
Zhang H +8 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Quantum hashing via ∈-universal hashing constructions and classical fingerprinting
Lobachevskii Journal of Mathematics, 2015zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Ablayev F., Ablayev M.
openaire +3 more sources
Energy Scalable Universal Hashing
IEEE Transactions on Computers, 2005Message authentication codes (MACs) are valuable tools for ensuring the integrity of messages. MACs may be built around a universal hash function (NH) which was explored in the construction of UMAC. In this paper, we use a variation on NH called WH. WH reaches optimally in the sense that it is universal with half the hash length of NH and it achieves ...
J. Kaps, K. Yuksel, B. Sunar
openaire +1 more source

