Статті в журналах з теми "HASH METHODS"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "HASH METHODS".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Safaryan, Olga, Larissa Cherckesova, Nikita Lyashenko, Pavel Razumov, Vladislav Chumakov, Boris Akishin, and Andrey Lobodenko. "Modern Hash Collision CyberAttacks and Methods of Their Detection and Neutralization." Journal of Physics: Conference Series 2131, no. 2 (December 1, 2021): 022099. http://dx.doi.org/10.1088/1742-6596/2131/2/022099.
Повний текст джерелаBlackburn, Simon R. "Perfect Hash Families: Probabilistic Methods and Explicit Constructions." Journal of Combinatorial Theory, Series A 92, no. 1 (October 2000): 54–60. http://dx.doi.org/10.1006/jcta.1999.3050.
Повний текст джерелаJinnai, Yuu, and Alex Fukunaga. "On Hash-Based Work Distribution Methods for Parallel Best-First Search." Journal of Artificial Intelligence Research 60 (October 30, 2017): 491–548. http://dx.doi.org/10.1613/jair.5225.
Повний текст джерелаLiu, Xingbo, Xiushan Nie, Yingxin Wang, and Yilong Yin. "Jointly Multiple Hash Learning." Proceedings of the AAAI Conference on Artificial Intelligence 33 (July 17, 2019): 9981–82. http://dx.doi.org/10.1609/aaai.v33i01.33019981.
Повний текст джерелаFitas, Ricardo, Bernardo Rocha, Valter Costa, and Armando Sousa. "Design and Comparison of Image Hashing Methods: A Case Study on Cork Stopper Unique Identification." Journal of Imaging 7, no. 3 (March 8, 2021): 48. http://dx.doi.org/10.3390/jimaging7030048.
Повний текст джерелаMa, Xian-Qin, Chong-Chong Yu, Xiu-Xin Chen, and Lan Zhou. "Large-Scale Person Re-Identification Based on Deep Hash Learning." Entropy 21, no. 5 (April 30, 2019): 449. http://dx.doi.org/10.3390/e21050449.
Повний текст джерелаUssatova, О., Ye Begimbayeva, S. Nyssanbayeva, and N. Ussatov. "ANALYSIS OF METHODS AND PRACTICAL APPLICATION OF HASH FUNCTIONS." SERIES PHYSICO-MATHEMATICAL 5, no. 339 (October 15, 2021): 100–110. http://dx.doi.org/10.32014/2021.2518-1726.90.
Повний текст джерелаYARMILKO, Аndii, Inna ROZLOMII, and Yuliya MYSIURA. "USAGE OF HASH METHODS IN THE CRYPTOGRAPHIC DATA ANALYSIS." Herald of Khmelnytskyi National University 303, no. 6 (December 2021): 49–54. http://dx.doi.org/10.31891/2307-5732-2021-303-6-49-54.
Повний текст джерелаLong, Jun, Longzhi Sun, Liujie Hua, and Zhan Yang. "Discrete Semantics-Guided Asymmetric Hashing for Large-Scale Multimedia Retrieval." Applied Sciences 11, no. 18 (September 21, 2021): 8769. http://dx.doi.org/10.3390/app11188769.
Повний текст джерелаGabryel, Marcin, Konrad Grzanek, and Yoichi Hayashi. "Browser Fingerprint Coding Methods Increasing the Effectiveness of User Identification in the Web Traffic." Journal of Artificial Intelligence and Soft Computing Research 10, no. 4 (October 1, 2020): 243–53. http://dx.doi.org/10.2478/jaiscr-2020-0016.
Повний текст джерелаHe, Chao, Dalin Wang, Zefu Tan, Liming Xu, and Nina Dai. "Cross-Modal Discrimination Hashing Retrieval Using Variable Length." Security and Communication Networks 2022 (September 9, 2022): 1–12. http://dx.doi.org/10.1155/2022/9638683.
Повний текст джерелаCao, Mingwei, Haiyan Jiang, and Haifeng Zhao. "Hash Indexing-Based Image Matching for 3D Reconstruction." Applied Sciences 13, no. 7 (April 2, 2023): 4518. http://dx.doi.org/10.3390/app13074518.
Повний текст джерелаAysu, Aydin, and Patrick Schaumont. "Precomputation Methods for Hash-Based Signatures on Energy-Harvesting Platforms." IEEE Transactions on Computers 65, no. 9 (September 1, 2016): 2925–31. http://dx.doi.org/10.1109/tc.2015.2500570.
Повний текст джерелаWang, Letian, Ziyu Meng, Fei Dong, Xiao Yang, Xiaoming Xi, and Xiushan Nie. "Attention-Oriented Deep Multi-Task Hash Learning." Electronics 12, no. 5 (March 4, 2023): 1226. http://dx.doi.org/10.3390/electronics12051226.
Повний текст джерелаAbanga, Ellen Akongwin. "Symmetric, Asymmetric and Hash Functions." Advances in Multidisciplinary and scientific Research Journal Publication 10, no. 4 (November 30, 2022): 55–60. http://dx.doi.org/10.22624/aims/digital/v10n4p7.
Повний текст джерелаTiwari, Harshvardhan. "Merkle-Damgård Construction Method and Alternatives." Journal of information and organizational sciences 41, no. 2 (December 14, 2017): 283–304. http://dx.doi.org/10.31341/jios.41.2.9.
Повний текст джерелаZhou, Quan, Xiushan Nie, Yang Shi, Xingbo Liu, and Yilong Yin. "Focusing on Detail: Deep Hashing Based on Multiple Region Details (Student Abstract)." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 10 (April 3, 2020): 13991–92. http://dx.doi.org/10.1609/aaai.v34i10.7268.
Повний текст джерелаLv, Fang, Yuliang Wei, Xixian Han, and Bailing Wang. "Semi-supervised hash learning method with consistency-based dimensionality reduction." Advances in Mechanical Engineering 11, no. 1 (January 2019): 168781401881917. http://dx.doi.org/10.1177/1687814018819170.
Повний текст джерелаShan, Xue, Pingping Liu, Yifan Wang, Qiuzhan Zhou, and Zhen Wang. "Deep Hashing Using Proxy Loss on Remote Sensing Image Retrieval." Remote Sensing 13, no. 15 (July 25, 2021): 2924. http://dx.doi.org/10.3390/rs13152924.
Повний текст джерелаRen, Yanduo, Jiangbo Qian, Yihong Dong, Yu Xin, and Huahui Chen. "AVBH: Asymmetric Learning to Hash with Variable Bit Encoding." Scientific Programming 2020 (January 21, 2020): 1–11. http://dx.doi.org/10.1155/2020/2424381.
Повний текст джерелаZhu, Lei, Chaoqun Zheng, Xu Lu, Zhiyong Cheng, Liqiang Nie, and Huaxiang Zhang. "Efficient Multi-modal Hashing with Online Query Adaption for Multimedia Retrieval." ACM Transactions on Information Systems 40, no. 2 (April 30, 2022): 1–36. http://dx.doi.org/10.1145/3477180.
Повний текст джерелаThanalakshmi, P., R. Anitha, N. Anbazhagan, Woong Cho, Gyanendra Prasad Joshi, and Eunmok Yang. "A Hash-Based Quantum-Resistant Chameleon Signature Scheme." Sensors 21, no. 24 (December 16, 2021): 8417. http://dx.doi.org/10.3390/s21248417.
Повний текст джерелаFeng, Jiangfan, and Wenzheng Sun. "Improved Deep Hashing with Scalable Interblock for Tourist Image Retrieval." Scientific Programming 2021 (July 14, 2021): 1–14. http://dx.doi.org/10.1155/2021/9937061.
Повний текст джерелаSteinebach, Martin. "A Close Look at Robust Hash Flip Positions." Electronic Imaging 2021, no. 4 (January 18, 2021): 345–1. http://dx.doi.org/10.2352/issn.2470-1173.2021.4.mwsf-345.
Повний текст джерелаBARNA, Andrii, and Roman KAMINSKY. "ANALYSIS OF THE EFFICIENCY OF DATA CHUNKING METHODS FOR DATA DEDUBLICATION SYSTEMS." Herald of Khmelnytskyi National University. Technical sciences 315, no. 6(1) (December 29, 2022): 24–27. http://dx.doi.org/10.31891/2307-5732-2022-315-6-24-27.
Повний текст джерелаChen, Yaxiong, and Xiaoqiang Lu. "A Deep Hashing Technique for Remote Sensing Image-Sound Retrieval." Remote Sensing 12, no. 1 (December 25, 2019): 84. http://dx.doi.org/10.3390/rs12010084.
Повний текст джерелаKahri, Fatma, Hassen Mestiri, Belgacem Bouallegue, and Mohsen Machhout. "High Speed FPGA Implementation of Cryptographic KECCAK Hash Function Crypto-Processor." Journal of Circuits, Systems and Computers 25, no. 04 (February 2, 2016): 1650026. http://dx.doi.org/10.1142/s0218126616500262.
Повний текст джерелаLi, Hongming, Lilai Zhang, Hao Cao, and Yirui Wu. "Hash Based DNA Computing Algorithm for Image Encryption." Applied Sciences 13, no. 14 (July 23, 2023): 8509. http://dx.doi.org/10.3390/app13148509.
Повний текст джерелаPark, Si-Hyeon, Seong-Min You, Dong-Ho Song, and Kwangjae Lee. "Image-based Approaches for Identifying Harmful Sites using OCR and Average Hash Methods." TRANSACTION OF THE KOREAN INSTITUTE OF ELECTRICAL ENGINEERS P 72, no. 2 (June 30, 2023): 112–19. http://dx.doi.org/10.5370/kieep.2023.72.2.112.
Повний текст джерелаDuan, Lijuan, Chongyang Zhao, Jun Miao, Yuanhua Qiao, and Xing Su. "Deep Hashing Based Fusing Index Method for Large-Scale Image Retrieval." Applied Computational Intelligence and Soft Computing 2017 (2017): 1–8. http://dx.doi.org/10.1155/2017/9635348.
Повний текст джерелаChen, Ye. "Research of Data Storage and Querying Methods Based on Ring Distributed Hash." Open Automation and Control Systems Journal 7, no. 1 (September 14, 2015): 1203–9. http://dx.doi.org/10.2174/1874444301507011203.
Повний текст джерелаColbourn, Charles J., Erin Lanus, and Kaushik Sarkar. "Asymptotic and constructive methods for covering perfect hash families and covering arrays." Designs, Codes and Cryptography 86, no. 4 (May 26, 2017): 907–37. http://dx.doi.org/10.1007/s10623-017-0369-x.
Повний текст джерелаWei, Hongjian, and Yingping Huang. "Online Multiple Object Tracking Using Spatial Pyramid Pooling Hashing and Image Retrieval for Autonomous Driving." Machines 10, no. 8 (August 9, 2022): 668. http://dx.doi.org/10.3390/machines10080668.
Повний текст джерелаPatil, Vedika, Sakshi Jain, and Yogita Shah. "Secure Cryptography by Using Hash Application." Journal of Cyber Security in Computer System 1, no. 1 (May 11, 2022): 18–24. http://dx.doi.org/10.46610/jcscs.2022.v01i01.002.
Повний текст джерелаNi, Li Shun, and Bing Chen. "Design and Implementation of the Network Electronic Identity Management System." Applied Mechanics and Materials 548-549 (April 2014): 1334–38. http://dx.doi.org/10.4028/www.scientific.net/amm.548-549.1334.
Повний текст джерелаNkouankou, Aboubakar, Fotso Clarice, Wadoufey Abel, and René Ndoundam. "Pre-image attack of the MD5 hash function by proportional logic." International Journal of Research and Innovation in Applied Science 07, no. 08 (2022): 20–25. http://dx.doi.org/10.51584/ijrias.2022.7802.
Повний текст джерелаTan, Xiaoyan, Yun Zou, Ziyang Guo, Ke Zhou, and Qiangqiang Yuan. "Deep Contrastive Self-Supervised Hashing for Remote Sensing Image Retrieval." Remote Sensing 14, no. 15 (July 29, 2022): 3643. http://dx.doi.org/10.3390/rs14153643.
Повний текст джерелаQi, Xiaojun, Xianhua Zeng, Shumin Wang, Yicai Xie, and Liming Xu. "Cross-modal variable-length hashing based on hierarchy." Intelligent Data Analysis 25, no. 3 (April 20, 2021): 669–85. http://dx.doi.org/10.3233/ida-205162.
Повний текст джерелаYevseiev, Serhii, Alla Havrylova, Olha Korol, Oleh Dmitriiev, Oleksii Nesmiian, Yevhen Yufa, and Asadi Hrebennikov. "Research of collision properties of the modified UMAC algorithm on crypto-code constructions." EUREKA: Physics and Engineering, no. 1 (January 10, 2022): 34–43. http://dx.doi.org/10.21303/2461-4262.2022.002213.
Повний текст джерелаGórniak, Dawid, and Piotr Kopniak. "Comparing the speed of the selected hash and encryption algorithms." Journal of Computer Sciences Institute 4 (September 30, 2017): 82–86. http://dx.doi.org/10.35784/jcsi.598.
Повний текст джерелаSong, Gyeong Ju, Min Ho Song, and Hwa Jeong Seo. "Comparative analysis of quantum circuit implementation for domestic and international hash functions." Korean Institute of Smart Media 12, no. 2 (March 30, 2023): 83–90. http://dx.doi.org/10.30693/smj.2023.12.2.83.
Повний текст джерелаZhang, Lifang, Qi Shen, Defang Li, Guocan Feng, Xin Tang, and Patrick S. Wang. "Adaptive Hashing with Sparse Modification for Scalable Image Retrieval." International Journal of Pattern Recognition and Artificial Intelligence 31, no. 06 (March 30, 2017): 1754011. http://dx.doi.org/10.1142/s0218001417540118.
Повний текст джерелаWang, Dan. "Recognition and Error Correction Techniques for Piano Playing Music Based on Convolutional Cyclic Hashing Method." Wireless Communications and Mobile Computing 2022 (April 9, 2022): 1–11. http://dx.doi.org/10.1155/2022/5660961.
Повний текст джерелаFitriyanto, Rachmad, Anton Yudhana, and Sunardi Sunardi. "Implementation SHA512 Hash Function And Boyer-Moore String Matching Algorithm For Jpeg/exif Message Digest Compilation." Jurnal Online Informatika 4, no. 1 (September 6, 2019): 16. http://dx.doi.org/10.15575/join.v4i1.304.
Повний текст джерелаXu, Yang, Lei Zhu, Zhiyong Cheng, Jingjing Li, and Jiande Sun. "Multi-Feature Discrete Collaborative Filtering for Fast Cold-Start Recommendation." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 01 (April 3, 2020): 270–78. http://dx.doi.org/10.1609/aaai.v34i01.5360.
Повний текст джерелаHuang, Xiaoli, Haibo Chen, and Zheng Zhang. "Design and Application of Deep Hash Embedding Algorithm with Fusion Entity Attribute Information." Entropy 25, no. 2 (February 15, 2023): 361. http://dx.doi.org/10.3390/e25020361.
Повний текст джерелаChoi, Jong-Hyeok, Fei Hao, and Aziz Nasridinov. "HI-Sky: Hash Index-Based Skyline Query Processing." Applied Sciences 10, no. 5 (March 2, 2020): 1708. http://dx.doi.org/10.3390/app10051708.
Повний текст джерелаSun, Li, and Bing Song. "Feature adaptive multi-view hash for image search." Electronic Research Archive 31, no. 9 (2023): 5845–65. http://dx.doi.org/10.3934/era.2023297.
Повний текст джерелаSuhaili, Shamsiah, and Norhuzaimin Julai. "FPGA-based Implementation of SHA-256 with Improvement of Throughput using Unfolding Transformation." Pertanika Journal of Science and Technology 30, no. 1 (January 10, 2022): 581–603. http://dx.doi.org/10.47836/pjst.30.1.32.
Повний текст джерелаTang, Xu, Chao Liu, Jingjing Ma, Xiangrong Zhang, Fang Liu, and Licheng Jiao. "Large-Scale Remote Sensing Image Retrieval Based on Semi-Supervised Adversarial Hashing." Remote Sensing 11, no. 17 (September 1, 2019): 2055. http://dx.doi.org/10.3390/rs11172055.
Повний текст джерела