-
61
EFH:an online unsupervised hash learning algorithm
Published 2020-03-01Subjects: Get full text
Article -
62
OpenFlow table lookup scheme integrating multiple-cell Hash table with TCAM
Published 2016-10-01Subjects: Get full text
Article -
63
Address overloading-based packet forwarding verification in SDN
Published 2022-03-01Subjects: Get full text
Article -
64
-
65
Self-healing group key distribution scheme with revocation based on dual directional hash chain
Published 2009-01-01Subjects: Get full text
Article -
66
SSDHT:social network-based secure DHT mechanism
Published 2018-11-01Subjects: Get full text
Article -
67
Self-healing key distribution scheme of MANET based on sliding window
Published 2009-01-01Subjects: Get full text
Article -
68
Distributed storage causal consistency model with trusted constraint
Published 2021-06-01Subjects: Get full text
Article -
69
Multi-parties key agreement protocol based on elliptic curve
Published 2016-05-01Subjects: Get full text
Article -
70
New hash function based on C-MD structure and chaotic neural network
Published 2023-06-01Subjects: “…hash function…”
Get full text
Article -
71
Related-key rectangle attack on the full ARIRANG encryption mode
Published 2011-01-01Subjects: Get full text
Article -
72
Novel self-renewal hash chain scheme based on (t,n) threshold and division tree
Published 2013-04-01Subjects: Get full text
Article -
73
Nearest neighbor search algorithm for high dimensional data based on weighted self-taught hashing
Published 2017-06-01Subjects: Get full text
Article -
74
Cloud data assured deletion scheme based on overwrite verification
Published 2019-01-01Subjects: Get full text
Article -
75
Preimage and pseudo-collision attacks on 29-step SM3 hash function with padding
Published 2014-02-01Subjects: “…hash function…”
Get full text
Article -
76
Preimage and pseudo collision attacks on round-reduced DHA-256 hash function
Published 2013-06-01Subjects: “…DHA-256 hash function…”
Get full text
Article -
77
Key storage management scheme based on keyed hash tree with state
Published 2018-05-01Subjects: Get full text
Article -
78
Anonymous security authentication scheme using elliptic curve cryptography and hash function in mobile network
Published 2016-05-01Subjects: Get full text
Article -
79
Supply chain dynamic multi-center coordination authentication model based on block chain
Published 2016-01-01Subjects: Get full text
Article -
80
A Comprehensive Analysis of Cryptographic Algorithms: Evaluating Security, Efficiency, and Future Challenges
Published 2025-01-01Subjects: Get full text
Article