Filters








7,298 Hits in 5.3 sec

Classification of Hash Functions Suitable for Real-Life Systems

Y. HIRAI, T. KUROKAWA, S. MATSUO, H. TANAKA, A. YAMAMURA
2008 IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences  
Less efficient than CRHF (Performance, Key size) 24 Aug. 2006 2nd Hash Workshop Hash functions in Real-Systems Hash functions are widely used in real systems For securing information systems  ...  function can be short Other usages Database matching Software Download IDS DKIM 24 Aug. 2006 2nd Hash Workshop Security of Hash in Real System Security requirements of real-system is decided  ... 
doi:10.1093/ietfec/e91-a.1.64 fatcat:ayfdwa6swresdkhkvjgzon3aru

Enhanced Attribute Based Encryption for Cloud Computing

N. Saravana Kumar, G.V. Rajya Lakshmi, B. Balamurugan
2015 Procedia Computer Science  
Secondly, a new encryption method based on Attribute Based Encryption (ABE) using hash functions, digital signature and asymmetric encryptions scheme has been proposed.  ...  Security factors are reasons behind lesser number of real times and business related cloud applications compared to consumer related cloud application.  ...  The modification of the ABE algorithm with hash function associated with the asymmetric encryption the algorithm could be applicable for the real time systems.  ... 
doi:10.1016/j.procs.2015.02.127 fatcat:thzgvzhc4ff2ro4dqwwqwjd5du

A Methodology for P2P Traffic Measurement Using Application Signature

Liu Bin, Li ZhiTang, Tu Hao
2007 Proceedings of the 2nd International ICST Conference on Scalable Information Systems  
This paper presents a measurement system which reliably detects and measures P2P traffic in real-time.  ...  P2P application has become tremendously popular over the last few years, now accounting for a significant share of the total network traffic.  ...  iptables -t mangle - EXPERIMENTS To validate and evaluate the feasibility of our P2P measurement system, we performed a test in a real life environment.  ... 
doi:10.4108/infoscale.2007.905 dblp:conf/infoscale/BinTH07 fatcat:wqbpepjcxzbfjhbbknrcfxf35m

Privacy preserving on Radio Frequency Identification systems

Hua Wang, Lili Sun, Jianming Yong, Yongbing Zhang
2009 2009 13th International Conference on Computer Supported Cooperative Work in Design  
A proposal to protecting security and privacy of customers, as a solution of the challenge for low-cost RFID systems is designed. Finally, comparisons to related works of the proposal are described.  ...  RFID systems have already widely applied in industry and have been bringing lots of benefits to our daily life, it also creates new security and privacy problems to individuals and organizations.  ...  The minimal hardware complexity of a hash function remains a real open problem [8] .  ... 
doi:10.1109/cscwd.2009.4968136 dblp:conf/cscwd/WangSYZ09 fatcat:ytel6xee6vgohi3zkpvgydeyoq

Classification and Retrieval of Multimedia Book Cloud Resources Based upon Hash Algorithm

Li Shen
2022 Mobile Information Systems  
For the multimedia retrieval and classification in the era of big data, hash algorithm is right to the point.  ...  and classification method, and realize the classification and retrieval of multimedia book cloud resources with the help of hash algorithm.  ...  most suitable algorithm for multimedia cloud resources-hash algorithm.  ... 
doi:10.1155/2022/9323949 doaj:8c181487c1f247de9a539d4c1cfd3e59 fatcat:xcd4n2fkora2thp2oobgy2lrmi

AN INTRODUCTION TO DIGITAL TRANSFORMATION TECHNOLOGIES

Chellammal Surianarayanan
2019 INTERNATIONAL JOURNAL OF INDUSTRIAL ENGINEERING RESEARCH AND DEVELOPMENT  
Digital transformation is process of using digital technologies and integrating the technologies in all areas of business which transforms four important aspects including system, process, technology and  ...  In this paper, the need for digital transformation, steps of digital transformation and important digital transformation technologies namely cloud computing, big data, data mining, machine learning techniques  ...  In addition, for each unique input, it produces the same output string. More importantly hash functions are one way functions. In blockchain, each block is a group of transactions.  ... 
doi:10.34218/ijaret.11.2.2020.040 fatcat:ptqp2fg7urdbho4mzovlqgmlye

An Efficient Parallelized L7-Filter Design for Multicore Servers

Danhua Guo, Laxmi Narayan Bhuyan, Bin Liu
2012 IEEE/ACM Transactions on Networking  
We further introduce a Hierarchical AHRW (AHRW-tree) algorithm that considers characteristics of the multicore architecture such as cache and hardware topology by developing a hash tree architecture.  ...  The algorithm reduces the scheduling overhead to instead of and produces a better balance between locality and load balancing.  ...  Fig. 6 . 6 System throughput comparison using different schedulers for all the traces. Fig. 7 . 7 Life-of-a-packet analysis for the TU trace.  ... 
doi:10.1109/tnet.2011.2177858 fatcat:mvpluu4jb5dhlhz65arx63g5ya

SECURE AND INTELLIGENT POWER MANAGEMENT SCHEMA FOR HETEROGENOUS DISTRIBUTED WIRELESS MULTIMEDIA SENSOR NETWORKS

Avinash Singh
2017 International Journal of Advanced Research in Computer Science  
We developed fuzzy logic controller that trace route by ant path search algorithm and implement security by using a novel hash function.  ...  effectively control mechanism for handling different data transmission with maintained quality of service for system without compromising security services.  ...  SECURITY MODULE In this section, one way hashing function technique is implemented for ensuring the data security while transmission.  ... 
doi:10.26483/ijarcs.v8i8.4721 fatcat:465ge63hevgmdiuijq222qwetu

Chisel

Jahangir Hasan, Srihari Cadambi, Venkatta Jakkula, Srimat Chakradhar
2006 SIGARCH Computer Architecture News  
Implementation Notes • Generic desktop PCs not suitable. -Too slow -Too serial -Too power-hungry • Dedicated hardware often used for classification.  ...  Experimental Evaluations • Incremental update speed: -Authors found some real-life update traces, on sets of around 100,000 rules. All traces lasted about for 8 hours.  ...  Authors' Conclusions • Completely collision-free hash table architecture. • Allows for rapid incremental updates. • Only requires 4 memory accesses, independent of key length, and only one of these is  ... 
doi:10.1145/1150019.1136503 fatcat:7xanxukjgzdihlpr64bj47oqra

Parallel Attribute Reduction Algorithm for Complex Heterogeneous Data Using MapReduce

Tengfei Zhang, Fumin Ma, Jie Cao, Chen Peng, Dong Yue
2018 Complexity  
To improve the reduction efficiency, the hashing Map/Reduce functions were designed to speed up the positive region calculation.  ...  The MapReduce-based parallelization method for attribute reduction was proposed in the framework of neighborhood multigranulation rough sets.  ...  In fact, the classification accuracy is the important factor that should be considered in real-life applications.  ... 
doi:10.1155/2018/8291650 fatcat:mfjuud735baifngi4vtwsda7pq

Privacy Preserving in Data Mining using Bi-party Data Releasing Method

K. Noel Binny, Nisha Varghese
2018 IJARCCE  
In the case of vertically-partitioned data, we can use two types of utility functions: First, utility functions such as information gain, maximum function, and the widest (normalized) range of values that  ...  The score is calculated using a utility function. The proposed distributed exponential mechanism is therefore independent of the choice of the utility function.  ...  In many real-life applications, the user may have to focus in mining for a small knowledge from this tremendous amount of data.  ... 
doi:10.17148/ijarcce.2018.71017 fatcat:4otcuxevlrewpfdh3cag4ejq2a

APPLICABLE LIGHT-WEIGHT CRYPTOGRAPHYTOSECURE MEDICAL DATA IN IOT SYSTEMS

Norah Alassaf, Basem Alkazemi, Adnan Gutub
2017 Journal of research in engineering and applied sciences  
This work study several realistic lightweight encryption algorithms suitable for IoT medical systems.  ...  In order to protect the private medical data in the internet of things (IoT) field, the search for the optimal encryption algorithm is a must.  ...  Acknowledgments Thanks to Umm Al-Qura University (UQU) for encouraging this research work.  ... 
doi:10.46565/jreas.2017.v02i02.002 fatcat:5f734antefhq3bbezq3g7xr4jm

Supervised Deep Hashing for High-dimensional and Heterogeneous Case-based Reasoning [article]

Qi Zhang, Liang Hu, Chongyang Shi, Ke Liu, Longbing Cao
2022 arXiv   pre-print
To cater to incremental learning of CBR, we further propose an adaptive learning strategy to update the hash function.  ...  HeCBR achieves desirable performance compared with the state-of-the-art CBR methods and performs significantly better than hashing-based CBR methods in classification.  ...  ), National Natural Science Foundation of China (No. 61502033), and the Fundamental Research Funds for the Central Universities.  ... 
arXiv:2206.14523v1 fatcat:f5stuoo2pjc7ff74i4demodpsm

A Survey on Data Deduplication in Large Scale Data

Saniya Sudhakaran, Meera Treesa
2017 International Journal of Computer Applications  
This training set can be effectively used for identifying where the most ambiguous pairs lie and to configure the classification approaches. when compared with state-of-the-art deduplication methods in  ...  database size increases day by day the matching process's complexity becoming one of the major challenges for data deduplication.  ...  comes into picture when manually identifying suitable labels for records is difficult mainly important for record matching.  ... 
doi:10.5120/ijca2017913696 fatcat:qouh3joftzfdvgqiz2b6uhsqna

LoadIQ: Learning to Identify Workload Phases from a Live Storage Trace

Pankaj Pipada, Achintya Kundu, Kanchi Gopinath, Chiranjib Bhattacharyya, Sai Susarla, P. C. Nagesh
2012 USENIX Workshop on Hot Topics in Storage and File Systems  
This paper presents LoadIQ, a novel, versatile, adaptive, application phase detector for networked (file and block) storage systems.  ...  Such labels could be used to generate alerts or to trigger phase-specific system tuning. Our results show that LoadIQ is able to identify workload phases (such as in TPC-DS) with accuracy > 93%.  ...  By detecting application phase transitions, we show that these traces can be a rich and dependable source of contextual information for storage systems to use for managing an application in its life cycle  ... 
dblp:conf/hotstorage/PipadaKGBSN12 fatcat:yad675jrjnh6bmasw7ryjw22mq
« Previous Showing results 1 — 15 out of 7,298 results