Results 51 to 60 of about 924,323 (216)
On Symmetric and Asymmetric LSHs for Inner Product Search [PDF]
We consider the problem of designing locality sensitive hashes (LSH) for inner product similarity, and of the power of asymmetric hashes in this context.
Neyshabur, Behnam, Srebro, Nathan
core
Attacks on quantum key distribution protocols that employ non-ITS authentication
We demonstrate how adversaries with unbounded computing resources can break Quantum Key Distribution (QKD) protocols which employ a particular message authentication code suggested previously.
A Abidin+25 more
core +1 more source
A secured cloud‐medical data sharing with A‐BRSA and Salp ‐Ant Lion Optimisation Algorithm
Abstract Sharing medical data among healthcare providers, researchers, and patients is crucial for efficient healthcare services. Cloud‐assisted smart healthcare (s‐healthcare) systems have made it easier to store EHRs effectively. However, the traditional encryption algorithms used to secure this data can be vulnerable to attacks if the encryption key
Adel Binbusayyis+7 more
wiley +1 more source
Banal Radicalism: Free Spaces and the Routinization of Radical Practices in Far‐Right Movements
ABSTRACT How do free spaces become radicalizing spaces? Studies of far‐right radicalism have highlighted the role of insulated movement spaces in radicalizing their members. In these spaces, participants can flaunt their radical ideas and infuse them into everyday practices, forming these ideas into comprehensive and resilient worldviews.
Oded Marom
wiley +1 more source
Quantum Entanglement Capacity with Classical Feedback
For any quantum discrete memoryless channel, we define a quantity called quantum entanglement capacity with classical feedback ($E_B$), and we show that this quantity lies between two other well-studied quantities.
A. W. Leung+5 more
core +1 more source
ABSTRACT Identification of conserved genomic sequences and their utilisation as anchor points for clade detection and/or characterisation is a mainstay in ecological studies. For environmental DNA (eDNA) assays, effective processing of large genomic datasets is crucial for reliable species detection in biodiversity monitoring.
Mark Louie D. Lopez+6 more
wiley +1 more source
Software Performance of Universal Hash Functions [PDF]
This paper compares the parameters sizes and software performance of several recent constructions for universal hash functions: bucket hashing, polynomial hashing, Toeplitz hashing, division hashing, evaluation hashing, and MMH hashing. An objective comparison between these widely varying approaches is achieved by defining constructions that offer a ...
Bart Preneel, Wim Nevelsteen
openaire +2 more sources
“The Pause That Refreshes”: American Servicemen on R&R in Australia, 1967–1971
Nearly 10% of the 3 million Americans who served in Vietnam spent one week of “R&R” leave in Australia—principally in Sydney. This “friendly invasion” constitutes a substantial neglected legacy of the conflict. Across dozens of oral history interviews and memoirs, US servicemen recall with fondness their week‐long respite in a nation that was at once ...
Chris Dixon, Jon Piccini
wiley +1 more source
Simple proof of confidentiality for private quantum channels in noisy environments
Complete security proofs for quantum communication protocols can be notoriously involved, which convolutes their verification, and obfuscates the key physical insights the security finally relies on.
Briegel, H. J.+4 more
core +1 more source
Current application of blockchain technology in healthcare and its potential roles in Urology
Objective To assess the current uses of blockchain technology in surgery and explore potential applications in urology. Methods A systematic literature review and critical appraisal was performed. The PubMed database was searched for all relevant papers published in English, between 2003 and 2023, on blockchain and surgery, and urology.
Sulleyman Felemban+6 more
wiley +1 more source