Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
hash algorithms
biblio
Design and Analysis of Hash Algorithm Using Autonomous Initial Value Proposed Secure Hash Algorithm64
Submitted by grigby1 on Thu, 06/09/2022 - 1:39pm
pubcrawl
resilience
Cryptography
Memory management
complexity
Compositionality
Input variables
Hash functions
hash algorithms
smart cards
Focusing
SHA
Resiliency
codes
One-way Function
passwords
biblio
Digital Data Identification for Deduplication Process using Cryptographic Hashing Techniques
Submitted by grigby1 on Thu, 06/09/2022 - 1:38pm
Cloud Computing
Organizations
pubcrawl
resilience
Cryptography
Compositionality
Resistance
hash algorithms
Resiliency
avalanche effect
Cloud storage system
Deduplication
hashing techniques
Strong collision resistance
Weak collision resistance
biblio
Object Classification of Remote Sensing Images Based on Optimized Projection Supervised Discrete Hashing
Submitted by grigby1 on Thu, 06/09/2022 - 1:38pm
pubcrawl
resilience
Memory management
Classification algorithms
Task Analysis
Compositionality
Hash functions
remote sensing
hash algorithms
Learning systems
object classification
Image Processing
Pattern recognition
Resiliency
optimized projection
supervised discrete hashing
biblio
Sponge based Lightweight Cryptographic Hash Functions for IoT Applications
Submitted by grigby1 on Thu, 06/09/2022 - 1:38pm
Resiliency
SPONGENT
sponge construction
QUARK
PHOTON
Lightweight Hash
Keccak
HASH-ONE
GLUON
Internet of Things
Photonics
hash algorithms
Cryptographic Hash Function
Compositionality
batteries
resilience
pubcrawl
biblio
SCKHA: A New Stream Cipher Algorithm Based on Key Hashing and Splitting Technique
Submitted by grigby1 on Thu, 06/09/2022 - 1:37pm
Ciphers
encryption
information security
pubcrawl
resilience
Throughput
authentication
Cryptography
Reliability
Compositionality
hash algorithms
stream cipher
symmetric encryption
Resiliency
Computational efficiency
Key Hashing
biblio
Confirmation of Mutual Synchronization of the TPMs Using Hash Functions
Submitted by grigby1 on Thu, 06/09/2022 - 1:37pm
Hash Function
tree parity machines
synchronization time
ping
learning rules
input neurons
Hebbian rule
Resiliency
delay
hash algorithms
hash
Hash functions
Cryptography
Network
Market research
Synchronization
graphics processing units
Compositionality
Task Analysis
Neural networks
delays
resilience
pubcrawl
encryption
biblio
Perfect Tabular Hashing in Pseudolinear Time
Submitted by grigby1 on Thu, 06/09/2022 - 1:37pm
pubcrawl
resilience
Conferences
Prototypes
Compositionality
hash table
Time complexity
Hash Function
Hash functions
hash algorithms
Resiliency
2SAT
perfect hashing
SAT
tabulation hashing
biblio
An Improved Deep Pairwise Supervised Hashing Algorithm for Fast Image Retrieval
Submitted by grigby1 on Thu, 06/09/2022 - 1:36pm
feature extraction
pubcrawl
resilience
Manuals
Compositionality
deep neural networks
image retrieval
Quantization (signal)
hash algorithms
learning (artificial intelligence)
Image coding
Resiliency
deep hashing algorithm
hash code learning
representation learning
biblio
Optical Hash Function for High Speed and High Security Algorithm using Ring Resonator System
Submitted by grigby1 on Thu, 06/09/2022 - 1:36pm
pubcrawl
resilience
Heuristic algorithms
computer security
Compositionality
Hash Function
Hash functions
hash algorithms
Integrated optics
Resiliency
optical cryptography
Optical design
Optical filters
Optical solitons
Resonator filters
ring resonator
biblio
Perceptual Image Hashing Using Surffor Feature Extraction and Ensemble Classifier
Submitted by grigby1 on Mon, 03/14/2022 - 11:22am
Metrics
surf features
Signal processing algorithms
signal processing
Safe Coding
Resistance
Resiliency
resilience
pubcrawl
Policy Based Governance
hash algorithms
Keyboards
image hashing
Image coding
Human Factors
Human behavior
feature extraction
Ensemble classifier
Computer hacking
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »