Sciweavers

648 search results - page 3 / 130
» Authenticated hash tables
Sort
View
BWCCA
2010
13 years 10 days ago
Comments on a One-Way Hash Chain Based Authentication for FMIPv6
In this paper, we analyze a one-way hash chain based authentication scheme proposed by Haddad and Krishnan. The authentication scheme has been introduced for improving handover per...
Ilsun You, Jong-Hyouk Lee
TON
2008
89views more  TON 2008»
13 years 3 months ago
Simple summaries for hashing with choices
In a multiple-choice hashing scheme, each item is stored in one of 2 possible hash table buckets. The availability of these multiple choices allows for a substantial reduction in t...
Adam Kirsch, Michael Mitzenmacher
ANCS
2005
ACM
13 years 11 months ago
Segmented hash: an efficient hash table implementation for high performance networking subsystems
Hash tables provide efficient table implementations, achieving O(1), query, insert and delete operations at low loads. However, at moderate or high loads collisions are quite freq...
Sailesh Kumar, Patrick Crowley
AC
1997
Springer
13 years 9 months ago
Cryptographic Primitives for Information Authentication - State of the Art
This paper describes the state of the art for cryptographic primitives that are used for protecting the authenticity of information: cryptographic hash functions and digital signat...
Bart Preneel
SBBD
2008
256views Database» more  SBBD 2008»
13 years 6 months ago
Indexing Internal Memory with Minimal Perfect Hash Functions
A perfect hash function (PHF) is an injective function that maps keys from a set S to unique values, which are in turn used to index a hash table. Since no collisions occur, each k...
Fabiano C. Botelho, Hendrickson R. Langbehn, Guilh...