Journal articles on the topic 'HASH METHODS'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'HASH METHODS.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Safaryan, Olga, Larissa Cherckesova, Nikita Lyashenko, Pavel Razumov, Vladislav Chumakov, Boris Akishin, and Andrey Lobodenko. "Modern Hash Collision CyberAttacks and Methods of Their Detection and Neutralization." Journal of Physics: Conference Series 2131, no. 2 (December 1, 2021): 022099. http://dx.doi.org/10.1088/1742-6596/2131/2/022099.
Full textBlackburn, Simon R. "Perfect Hash Families: Probabilistic Methods and Explicit Constructions." Journal of Combinatorial Theory, Series A 92, no. 1 (October 2000): 54–60. http://dx.doi.org/10.1006/jcta.1999.3050.
Full textJinnai, Yuu, and Alex Fukunaga. "On Hash-Based Work Distribution Methods for Parallel Best-First Search." Journal of Artificial Intelligence Research 60 (October 30, 2017): 491–548. http://dx.doi.org/10.1613/jair.5225.
Full textLiu, Xingbo, Xiushan Nie, Yingxin Wang, and Yilong Yin. "Jointly Multiple Hash Learning." Proceedings of the AAAI Conference on Artificial Intelligence 33 (July 17, 2019): 9981–82. http://dx.doi.org/10.1609/aaai.v33i01.33019981.
Full textFitas, Ricardo, Bernardo Rocha, Valter Costa, and Armando Sousa. "Design and Comparison of Image Hashing Methods: A Case Study on Cork Stopper Unique Identification." Journal of Imaging 7, no. 3 (March 8, 2021): 48. http://dx.doi.org/10.3390/jimaging7030048.
Full textMa, Xian-Qin, Chong-Chong Yu, Xiu-Xin Chen, and Lan Zhou. "Large-Scale Person Re-Identification Based on Deep Hash Learning." Entropy 21, no. 5 (April 30, 2019): 449. http://dx.doi.org/10.3390/e21050449.
Full textUssatova, О., Ye Begimbayeva, S. Nyssanbayeva, and N. Ussatov. "ANALYSIS OF METHODS AND PRACTICAL APPLICATION OF HASH FUNCTIONS." SERIES PHYSICO-MATHEMATICAL 5, no. 339 (October 15, 2021): 100–110. http://dx.doi.org/10.32014/2021.2518-1726.90.
Full textYARMILKO, Аndii, Inna ROZLOMII, and Yuliya MYSIURA. "USAGE OF HASH METHODS IN THE CRYPTOGRAPHIC DATA ANALYSIS." Herald of Khmelnytskyi National University 303, no. 6 (December 2021): 49–54. http://dx.doi.org/10.31891/2307-5732-2021-303-6-49-54.
Full textLong, Jun, Longzhi Sun, Liujie Hua, and Zhan Yang. "Discrete Semantics-Guided Asymmetric Hashing for Large-Scale Multimedia Retrieval." Applied Sciences 11, no. 18 (September 21, 2021): 8769. http://dx.doi.org/10.3390/app11188769.
Full textGabryel, Marcin, Konrad Grzanek, and Yoichi Hayashi. "Browser Fingerprint Coding Methods Increasing the Effectiveness of User Identification in the Web Traffic." Journal of Artificial Intelligence and Soft Computing Research 10, no. 4 (October 1, 2020): 243–53. http://dx.doi.org/10.2478/jaiscr-2020-0016.
Full textHe, Chao, Dalin Wang, Zefu Tan, Liming Xu, and Nina Dai. "Cross-Modal Discrimination Hashing Retrieval Using Variable Length." Security and Communication Networks 2022 (September 9, 2022): 1–12. http://dx.doi.org/10.1155/2022/9638683.
Full textCao, Mingwei, Haiyan Jiang, and Haifeng Zhao. "Hash Indexing-Based Image Matching for 3D Reconstruction." Applied Sciences 13, no. 7 (April 2, 2023): 4518. http://dx.doi.org/10.3390/app13074518.
Full textAysu, Aydin, and Patrick Schaumont. "Precomputation Methods for Hash-Based Signatures on Energy-Harvesting Platforms." IEEE Transactions on Computers 65, no. 9 (September 1, 2016): 2925–31. http://dx.doi.org/10.1109/tc.2015.2500570.
Full textWang, Letian, Ziyu Meng, Fei Dong, Xiao Yang, Xiaoming Xi, and Xiushan Nie. "Attention-Oriented Deep Multi-Task Hash Learning." Electronics 12, no. 5 (March 4, 2023): 1226. http://dx.doi.org/10.3390/electronics12051226.
Full textAbanga, Ellen Akongwin. "Symmetric, Asymmetric and Hash Functions." Advances in Multidisciplinary and scientific Research Journal Publication 10, no. 4 (November 30, 2022): 55–60. http://dx.doi.org/10.22624/aims/digital/v10n4p7.
Full textTiwari, Harshvardhan. "Merkle-Damgård Construction Method and Alternatives." Journal of information and organizational sciences 41, no. 2 (December 14, 2017): 283–304. http://dx.doi.org/10.31341/jios.41.2.9.
Full textZhou, Quan, Xiushan Nie, Yang Shi, Xingbo Liu, and Yilong Yin. "Focusing on Detail: Deep Hashing Based on Multiple Region Details (Student Abstract)." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 10 (April 3, 2020): 13991–92. http://dx.doi.org/10.1609/aaai.v34i10.7268.
Full textLv, Fang, Yuliang Wei, Xixian Han, and Bailing Wang. "Semi-supervised hash learning method with consistency-based dimensionality reduction." Advances in Mechanical Engineering 11, no. 1 (January 2019): 168781401881917. http://dx.doi.org/10.1177/1687814018819170.
Full textShan, Xue, Pingping Liu, Yifan Wang, Qiuzhan Zhou, and Zhen Wang. "Deep Hashing Using Proxy Loss on Remote Sensing Image Retrieval." Remote Sensing 13, no. 15 (July 25, 2021): 2924. http://dx.doi.org/10.3390/rs13152924.
Full textRen, Yanduo, Jiangbo Qian, Yihong Dong, Yu Xin, and Huahui Chen. "AVBH: Asymmetric Learning to Hash with Variable Bit Encoding." Scientific Programming 2020 (January 21, 2020): 1–11. http://dx.doi.org/10.1155/2020/2424381.
Full textZhu, Lei, Chaoqun Zheng, Xu Lu, Zhiyong Cheng, Liqiang Nie, and Huaxiang Zhang. "Efficient Multi-modal Hashing with Online Query Adaption for Multimedia Retrieval." ACM Transactions on Information Systems 40, no. 2 (April 30, 2022): 1–36. http://dx.doi.org/10.1145/3477180.
Full textThanalakshmi, P., R. Anitha, N. Anbazhagan, Woong Cho, Gyanendra Prasad Joshi, and Eunmok Yang. "A Hash-Based Quantum-Resistant Chameleon Signature Scheme." Sensors 21, no. 24 (December 16, 2021): 8417. http://dx.doi.org/10.3390/s21248417.
Full textFeng, Jiangfan, and Wenzheng Sun. "Improved Deep Hashing with Scalable Interblock for Tourist Image Retrieval." Scientific Programming 2021 (July 14, 2021): 1–14. http://dx.doi.org/10.1155/2021/9937061.
Full textSteinebach, Martin. "A Close Look at Robust Hash Flip Positions." Electronic Imaging 2021, no. 4 (January 18, 2021): 345–1. http://dx.doi.org/10.2352/issn.2470-1173.2021.4.mwsf-345.
Full textBARNA, Andrii, and Roman KAMINSKY. "ANALYSIS OF THE EFFICIENCY OF DATA CHUNKING METHODS FOR DATA DEDUBLICATION SYSTEMS." Herald of Khmelnytskyi National University. Technical sciences 315, no. 6(1) (December 29, 2022): 24–27. http://dx.doi.org/10.31891/2307-5732-2022-315-6-24-27.
Full textChen, Yaxiong, and Xiaoqiang Lu. "A Deep Hashing Technique for Remote Sensing Image-Sound Retrieval." Remote Sensing 12, no. 1 (December 25, 2019): 84. http://dx.doi.org/10.3390/rs12010084.
Full textKahri, Fatma, Hassen Mestiri, Belgacem Bouallegue, and Mohsen Machhout. "High Speed FPGA Implementation of Cryptographic KECCAK Hash Function Crypto-Processor." Journal of Circuits, Systems and Computers 25, no. 04 (February 2, 2016): 1650026. http://dx.doi.org/10.1142/s0218126616500262.
Full textLi, Hongming, Lilai Zhang, Hao Cao, and Yirui Wu. "Hash Based DNA Computing Algorithm for Image Encryption." Applied Sciences 13, no. 14 (July 23, 2023): 8509. http://dx.doi.org/10.3390/app13148509.
Full textPark, Si-Hyeon, Seong-Min You, Dong-Ho Song, and Kwangjae Lee. "Image-based Approaches for Identifying Harmful Sites using OCR and Average Hash Methods." TRANSACTION OF THE KOREAN INSTITUTE OF ELECTRICAL ENGINEERS P 72, no. 2 (June 30, 2023): 112–19. http://dx.doi.org/10.5370/kieep.2023.72.2.112.
Full textDuan, Lijuan, Chongyang Zhao, Jun Miao, Yuanhua Qiao, and Xing Su. "Deep Hashing Based Fusing Index Method for Large-Scale Image Retrieval." Applied Computational Intelligence and Soft Computing 2017 (2017): 1–8. http://dx.doi.org/10.1155/2017/9635348.
Full textChen, Ye. "Research of Data Storage and Querying Methods Based on Ring Distributed Hash." Open Automation and Control Systems Journal 7, no. 1 (September 14, 2015): 1203–9. http://dx.doi.org/10.2174/1874444301507011203.
Full textColbourn, Charles J., Erin Lanus, and Kaushik Sarkar. "Asymptotic and constructive methods for covering perfect hash families and covering arrays." Designs, Codes and Cryptography 86, no. 4 (May 26, 2017): 907–37. http://dx.doi.org/10.1007/s10623-017-0369-x.
Full textWei, Hongjian, and Yingping Huang. "Online Multiple Object Tracking Using Spatial Pyramid Pooling Hashing and Image Retrieval for Autonomous Driving." Machines 10, no. 8 (August 9, 2022): 668. http://dx.doi.org/10.3390/machines10080668.
Full textPatil, Vedika, Sakshi Jain, and Yogita Shah. "Secure Cryptography by Using Hash Application." Journal of Cyber Security in Computer System 1, no. 1 (May 11, 2022): 18–24. http://dx.doi.org/10.46610/jcscs.2022.v01i01.002.
Full textNi, Li Shun, and Bing Chen. "Design and Implementation of the Network Electronic Identity Management System." Applied Mechanics and Materials 548-549 (April 2014): 1334–38. http://dx.doi.org/10.4028/www.scientific.net/amm.548-549.1334.
Full textNkouankou, Aboubakar, Fotso Clarice, Wadoufey Abel, and René Ndoundam. "Pre-image attack of the MD5 hash function by proportional logic." International Journal of Research and Innovation in Applied Science 07, no. 08 (2022): 20–25. http://dx.doi.org/10.51584/ijrias.2022.7802.
Full textTan, Xiaoyan, Yun Zou, Ziyang Guo, Ke Zhou, and Qiangqiang Yuan. "Deep Contrastive Self-Supervised Hashing for Remote Sensing Image Retrieval." Remote Sensing 14, no. 15 (July 29, 2022): 3643. http://dx.doi.org/10.3390/rs14153643.
Full textQi, Xiaojun, Xianhua Zeng, Shumin Wang, Yicai Xie, and Liming Xu. "Cross-modal variable-length hashing based on hierarchy." Intelligent Data Analysis 25, no. 3 (April 20, 2021): 669–85. http://dx.doi.org/10.3233/ida-205162.
Full textYevseiev, Serhii, Alla Havrylova, Olha Korol, Oleh Dmitriiev, Oleksii Nesmiian, Yevhen Yufa, and Asadi Hrebennikov. "Research of collision properties of the modified UMAC algorithm on crypto-code constructions." EUREKA: Physics and Engineering, no. 1 (January 10, 2022): 34–43. http://dx.doi.org/10.21303/2461-4262.2022.002213.
Full textGórniak, Dawid, and Piotr Kopniak. "Comparing the speed of the selected hash and encryption algorithms." Journal of Computer Sciences Institute 4 (September 30, 2017): 82–86. http://dx.doi.org/10.35784/jcsi.598.
Full textSong, Gyeong Ju, Min Ho Song, and Hwa Jeong Seo. "Comparative analysis of quantum circuit implementation for domestic and international hash functions." Korean Institute of Smart Media 12, no. 2 (March 30, 2023): 83–90. http://dx.doi.org/10.30693/smj.2023.12.2.83.
Full textZhang, Lifang, Qi Shen, Defang Li, Guocan Feng, Xin Tang, and Patrick S. Wang. "Adaptive Hashing with Sparse Modification for Scalable Image Retrieval." International Journal of Pattern Recognition and Artificial Intelligence 31, no. 06 (March 30, 2017): 1754011. http://dx.doi.org/10.1142/s0218001417540118.
Full textWang, Dan. "Recognition and Error Correction Techniques for Piano Playing Music Based on Convolutional Cyclic Hashing Method." Wireless Communications and Mobile Computing 2022 (April 9, 2022): 1–11. http://dx.doi.org/10.1155/2022/5660961.
Full textFitriyanto, Rachmad, Anton Yudhana, and Sunardi Sunardi. "Implementation SHA512 Hash Function And Boyer-Moore String Matching Algorithm For Jpeg/exif Message Digest Compilation." Jurnal Online Informatika 4, no. 1 (September 6, 2019): 16. http://dx.doi.org/10.15575/join.v4i1.304.
Full textXu, Yang, Lei Zhu, Zhiyong Cheng, Jingjing Li, and Jiande Sun. "Multi-Feature Discrete Collaborative Filtering for Fast Cold-Start Recommendation." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 01 (April 3, 2020): 270–78. http://dx.doi.org/10.1609/aaai.v34i01.5360.
Full textHuang, Xiaoli, Haibo Chen, and Zheng Zhang. "Design and Application of Deep Hash Embedding Algorithm with Fusion Entity Attribute Information." Entropy 25, no. 2 (February 15, 2023): 361. http://dx.doi.org/10.3390/e25020361.
Full textChoi, Jong-Hyeok, Fei Hao, and Aziz Nasridinov. "HI-Sky: Hash Index-Based Skyline Query Processing." Applied Sciences 10, no. 5 (March 2, 2020): 1708. http://dx.doi.org/10.3390/app10051708.
Full textSun, Li, and Bing Song. "Feature adaptive multi-view hash for image search." Electronic Research Archive 31, no. 9 (2023): 5845–65. http://dx.doi.org/10.3934/era.2023297.
Full textSuhaili, Shamsiah, and Norhuzaimin Julai. "FPGA-based Implementation of SHA-256 with Improvement of Throughput using Unfolding Transformation." Pertanika Journal of Science and Technology 30, no. 1 (January 10, 2022): 581–603. http://dx.doi.org/10.47836/pjst.30.1.32.
Full textTang, Xu, Chao Liu, Jingjing Ma, Xiangrong Zhang, Fang Liu, and Licheng Jiao. "Large-Scale Remote Sensing Image Retrieval Based on Semi-Supervised Adversarial Hashing." Remote Sensing 11, no. 17 (September 1, 2019): 2055. http://dx.doi.org/10.3390/rs11172055.
Full text