Results 71 to 80 of about 924,323 (216)
Hardware Security in the Connected World
Depicts the components covered in the article. ABSTRACT The rapid proliferation of the Internet of Things (IoT) has integrated billions of smart devices into our daily lives, generating and exchanging vast amounts of critical data. While this connectivity offers significant benefits, it also introduces numerous security vulnerabilities.
Durba Chatterjee+4 more
wiley +1 more source
Square Hash: Fast Message Authentication via Optimized Universal Hash Functions [PDF]
This paper introduces two new ideas in the construction of fast universal hash functions geared towards the task of message authentication. First, we describe a simple but novel family of universal hash functions that is more efficient than many standard constructions. We compare our hash functions to the MMH family studied by Halevi and Krawczyk [12].
Sarvar Patel+2 more
openaire +2 more sources
A Guide to Machine Learning Epistemic Ignorance, Hidden Paradoxes, and Other Tensions
ABSTRACT Machine learning (ML) has rapidly scaled in capacity and complexity, yet blind spots persist beneath its high performance façade. In order to shed more light on this argument, this paper presents a curated catalogue of 175 unconventional concepts, each capturing a paradox, tension, or overlooked risk in modern ML practice.
M. Z. Naser
wiley +1 more source
Improved Densification of One Permutation Hashing [PDF]
The existing work on densification of one permutation hashing reduces the query processing cost of the $(K,L)$-parameterized Locality Sensitive Hashing (LSH) algorithm with minwise hashing, from $O(dKL)$ to merely $O(d + KL)$, where $d$ is the number of ...
Li, Ping, Shrivastava, Anshumali
core
Single‐cell sequencing sheds light on cellular diversity, development, and immune evolution in fish and invertebrates, offering new insights into environmental adaptation and evolutionary biology. ABSTRACT Single‐cell sequencing (SCS) technology has revolutionized the study of cellular heterogeneity by enabling the exploration of biological processes ...
Chongbin Hu+5 more
wiley +1 more source
A Composition Theorem for Universal One-Way Hash Functions [PDF]
Victor Shoup
openalex +1 more source
Lightweight RFID Privacy Protocol Based on Universal Hash Function [PDF]
Gao Shu-jing, Zhang Ruiquan
openalex +1 more source
Hash Property and Fixed-rate Universal Coding Theorems
Jun Muramatsu, Shigeki Miyake
openalex +2 more sources