Sciweavers

4438 search results - page 13 / 888
» On the Distribution of Keys by Hashing
Sort
View
ECCV
2010
Springer
15 years 5 months ago
Fast Approximate Nearest Neighbor Methods for Non-Euclidean Manifolds with Applications to Human Activity Analysis in Videos
Approximate Nearest Neighbor (ANN) methods such as Locality Sensitive Hashing, Semantic Hashing, and Spectral Hashing, provide computationally ecient procedures for nding objects...
Rizwan Chaudhry, Yuri Ivanov
P2P
2009
IEEE
15 years 6 months ago
A Trusted Infrastructure for P2P-based Marketplaces
Peer-to-peer (P2P) based marketplaces have a number of advantages over traditional centralized systems (such as eBay). Peers form a distributed hash table and store sale offers fo...
Tien Tuan Anh Dinh, Tom Chothia, Mark Ryan
CRYPTO
2008
Springer
100views Cryptology» more  CRYPTO 2008»
15 years 1 months ago
Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms
Abstract. This paper discusses key recovery and universal forgery attacks on several MAC algorithms based on universal hash functions. The attacks use a substantial number of verif...
Helena Handschuh, Bart Preneel
ICIAP
2005
ACM
15 years 12 months ago
Security Enhancement of Visual Hashes Through Key Dependent Wavelet Transformations
Parameterized wavelet filters and wavelet packet subband structures are discussed to be used as key dependent wavelet transforms in order to enhance the security of wavelet based h...
Albert Meixner, Andreas Uhl
CIKM
2007
Springer
15 years 5 months ago
External perfect hashing for very large key sets
We present a simple and efficient external perfect hashing scheme (referred to as EPH algorithm) for very large static key sets. We use a number of techniques from the literature ...
Fabiano C. Botelho, Nivio Ziviani