Sciweavers

4438 search results - page 24 / 888
» On the Distribution of Keys by Hashing
Sort
View
SIGCOMM
2012
ACM
13 years 2 months ago
HyperDex: a distributed, searchable key-value store
Distributed key-value stores are now a standard component of high-performance web services and cloud computing applications. While key-value stores offer significant performance...
Robert Escriva, Bernard Wong, Emin Gün Sirer
70
Voted
FSE
2004
Springer
90views Cryptology» more  FSE 2004»
15 years 5 months ago
Fast Software-Based Attacks on SecurID
SecurID is a widely used hardware token for strengthening authentication in a corporate environment. Recently, Biryukov, Lano, and Preneel presented an attack on the alleged SecurI...
Scott Contini, Yiqun Lisa Yin
ICDCS
2007
IEEE
15 years 6 months ago
Defragmenting DHT-based Distributed File Systems
Existing DHT-based file systems use consistent hashing to assign file blocks to random machines. As a result, a user task accessing an entire file or multiple files needs to r...
Jeffrey Pang, Phillip B. Gibbons, Michael Kaminsky...
SIGCOMM
2005
ACM
15 years 5 months ago
Fast hash table lookup using extended bloom filter: an aid to network processing
Hash table is used as one of the fundamental modules in several network processing algorithms and applications such as route lookup, packet classification, per-flow state manage...
Haoyu Song, Sarang Dharmapurikar, Jonathan S. Turn...
ICMCS
2007
IEEE
203views Multimedia» more  ICMCS 2007»
15 years 6 months ago
Attacking Some Perceptual Image Hash Algorithms
Perceptual hashing is an emerging solution for multimedia content authentication. Due to their robustness, such techniques might not work well when malicious attack is perceptuall...
Li Weng, Bart Preneel