Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
hash algorithms
biblio
A Hardware Implementation of the SHA2 Hash Algorithms Using CMOS 28nm Technology
Submitted by aekwall on Mon, 03/29/2021 - 11:06am
Hardware Implementation
SHA2 Hash algorithms
SHA-256
secure hash algorithm 2
hardware hash accelerator
CMOS 28nm technology
hash algorithms
Hash functions
adders
field programmable gate arrays
Compositionality
pubcrawl
CMOS technology
CMOS integrated circuits
Resiliency
Program processors
Hardware
Cryptography
biblio
Optimization of a Quantum-Secure Sponge-Based Hash Message Authentication Protocol
Submitted by grigby1 on Fri, 06/12/2020 - 11:10am
Protocols
Xilinx High-Level Synthesis
sponge-based SHA-3 hashing algorithm
sponge functions
SHA-2
SHA-1
Resiliency
resilience
quantum-secure sponge-based hash message authentication protocol
quantum cryptography
quantum computing standpoint
quantum computing
pubcrawl
Compositionality
post-quantum-secure SHA-3 hash message authentication
pipelined version
optimized version
optimization
networking security protocols
message authentication
hashing standard
Hash functions
hash algorithms
Hardware
fundamental building block
Cryptographic Protocols
biblio
A genetic algorithm for obtaining memory constrained near-perfect hashing
Submitted by grigby1 on Fri, 06/12/2020 - 11:10am
near-perfect hashing
uniform data distribution
Statistics
Sociology
search problems
Resiliency
resilience
pubcrawl
operating systems
open-addressing double-hashing approach
nonlinear transformation
Next generation networking
binary search
memory-constrained applications
Memory management
hash table
hash algorithms
genetic algorithms
genetic algorithm
file organisation
fast items retrieval
Compositionality
Cohttps://ieeexplore.ieee.org/document/8402794mplexity theory
biblio
A Hybrid Optimization Framework Based on Genetic Algorithm and Simulated Annealing Algorithm to Enhance Performance of Anomaly Network Intrusion Detection System Based on BP Neural Network
Submitted by grigby1 on Fri, 06/12/2020 - 11:10am
optimization strategy
learning rate
momentum term
network anomaly detection
network infrastructure attacks
network intrusion detection system
network security
neural nets
Neural networks
Intrusion Detection
optimized ANIDS based BPNN
pubcrawl
resilience
Resiliency
simulated annealing
simulated annealing algorithm
soft computing tool
Training
computer networks
Anomaly Detection
anomaly network intrusion detection system
back propagation neural network
Backpropagation
BP Neural Network
Classification algorithms
Compositionality
computer network security
ANIDS BPNN-GASAA
computer security
Cryptography
fitness value hashing
genetic algorithm
genetic algorithms
hash algorithms
hybrid optimization
biblio
Slot Assignment Algorithm Based on Hash Function for Multi-target RFID System
Submitted by grigby1 on Fri, 06/12/2020 - 11:09am
radiofrequency identification
wireless sensor networks
Throughput
telecommunication congestion control
tags collision
Tag matching
Tag group
Stability analysis
Smart tags
slot assignment algorithm
simulation
Resiliency
resilience
ALOHA algorithm
pubcrawl
object detection
Multitarget tags assignment slots algorithm
Multitarget RFID system
Multitag identification technique
Heuristic algorithms
Hash functions
Hash Function
hash algorithms
Compositionality
anti-collision algorithms
Anti-collision
biblio
Discrete Locally-Linear Preserving Hashing
Submitted by grigby1 on Fri, 06/12/2020 - 11:09am
locally linear preserving
unsupervised methods
Unsupervised Learning
unsupervised hashing method
unsupervised hashing algorithms
unsupervised hashing
search problems
Resiliency
resilience
pubcrawl
nearest neighbour methods
nearest neighbor search
matrix algebra
locally linear structure
anchor embedding
local weight estimation
local anchor embedding algorithm
image retrieval
Image coding
hash algorithms
graph theory
discrete locally-linear preserving hashing
discrete hashing
Compositionality
Binary codes
approximate adjacent matrix
anchor graph construction algorithm
biblio
Fast Reconfigurable Hash Functions for Network Flow Hashing in FPGAs
Submitted by grigby1 on Fri, 06/12/2020 - 11:09am
high-quality hash functions
Resiliency
resilience
Registers
reconfigurable hash function
reconfigurable design
reconfigurable architectures
pubcrawl
network flow hashing
multiobjective linear genetic programming
Monitoring
Linear programming
IP networks
Compositionality
high speed computer networks
hash function design
hash algorithms
hardware acceleration
Hardware
genetic programming
genetic algorithms
FPGA
field programmable gate arrays
field programmable gate array
fast reconfigurable hash functions
Cryptography
biblio
Enhanced Secure Hash Algorithm-512 based on Quadratic Function
Submitted by grigby1 on Fri, 06/12/2020 - 11:09am
hash outputs
Urban areas
SHA-1
Resiliency
resilience
Registers
quadratic function
pubcrawl
primitive function
password
mobile ad hoc networks
avalanche effect
hash message
Hash functions
hash collisions
hash collision
hash algorithms
extended bits
enhanced SHA-1 algorithm
enhanced secure hash algorithm-512
Cryptography
Compositionality
biblio
Application of Improved Image Hash Algorithm in Image Tamper Detection
Submitted by grigby1 on Fri, 06/12/2020 - 11:09am
image tamper detection
Transportation
smart cities
ROC curve
ring segmentation
ring segment
ring region
Resiliency
resilience
random vector
pubcrawl
measurement vector
improved image hashing algorithm
image tampering detection
Annular Segmentation
image segmentation
image hashing technique
image
hash value
hash algorithms
hash algorithm
feature extraction
detection
Cryptography
Conferences
compressed sensing
Compositionality
Big Data
biblio
Supervised Max Hashing for Similarity Image Retrieval
Submitted by grigby1 on Fri, 06/12/2020 - 11:08am
resilience
hashing
image retrieval
k-ary base
labeled image datasets
learning (artificial intelligence)
mathematically differentiable approximation
nearest neighbor search
pubcrawl
Quantization (signal)
Hash functions
Resiliency
rich feature vectors
Semantics
similarity image retrieval
storage efficiency
supervised hashing methods
supervised max hashing
Training
feature vector generation
-Learning-to-Hash
-Winner-Take-All-Hash-Family
Approximation algorithms
argmax function
Compositionality
convolutional neural nets
convolutional neural networks
deep neural network architecture
feature extraction
-Convolutional-Neural-Networks
file organisation
gradient descent methods
gradient methods
hand-crafted feature vectors
hash algorithm
hash algorithms
hash code
Hash Function
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »