The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for hashes with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1990-2002 (15) 2003-2004 (21) 2005 (15) 2006 (24) 2007 (18) 2008 (19) 2009-2011 (16) 2012-2016 (17) 2017-2018 (18) 2019-2020 (20) 2021-2023 (18)
Publication types (Num. hits)
article(56) inproceedings(144) phdthesis(1)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 138 occurrences of 117 keywords

Results
Found 201 publication records. Showing 201 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
92Markku-Juhani Olavi Saarinen Linearization Attacks Against Syndrome Based Hashes. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF FSB, Syndrome Based Hashes, Provably Secure Hashes, Hash Function Cryptanalysis, Linearization Attack
79Tobias Scheidat, Claus Vielhauer, Jana Dittmann Advanced Studies on Reproducibility of Biometric Hashes. Search on Bibsonomy BIOID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF biometric hashing, semantic fusion, verification, measures, Biometrics, collision, handwriting, reproducibility
79Subashini Balachandran, Cornel Constantinescu Sequence of Hashes Compression in Data De-duplication. Search on Bibsonomy DCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Data De-duplication, cryptographic hashes compression
65Flavio D. Garcia, Peter van Rossum Sound Computational Interpretation of Symbolic Hashes in the Standard Model. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
57Chuohao Yeo, Parvez Ahammad, Kannan Ramchandran Rate-efficient visual correspondences using random projections. Search on Bibsonomy ICIP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
57Qusai Abuein, Susumu Shibusawa Signature Amortization Using Multiple Connected Chains. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Multicast stream authentication, signature amortization, web security, hash chain
50Peter Gutmann, David Naccache, Charles C. Palmer When Hashes Collide. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF cryptography, hashes, scripts
43Mariusz H. Jakubowski, Ramarathnam Venkatesan Randomized radon transforms for biometric authentication via fingerprint hashing. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2007 DBLP  DOI  BibTeX  RDF authentication, biometrics, fingerprints, hashing, radon transform
37Sreenivas Gollapudi, Rina Panigrahy The power of two min-hashes for similarity search among hierarchical data objects. Search on Bibsonomy PODS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF earth movers distance, similarity, locality sensitive hashing
37Wei Gao 0007, Xueli Wang, Dongqing Xie Chameleon Hashes Without Key Exposure Based on Factoring. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF chameleon signature, key-exposure, chameleon hash
37Oztan Harmanci, Vishal Monga, Mehmet Kivanç Mihçak Geometrically Invariant Image Watermarking via Robust Perceptual Hashes. Search on Bibsonomy ICIP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
37César Estébanez, Julio César Hernández Castro, Arturo Ribagorda, Pedro Isasi Viñuela Finding State-of-the-Art Non-cryptographic Hashes with Genetic Programming. Search on Bibsonomy PPSN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
37Josef Scharinger Construction of Data Dependent Chaotic Permutation Hashes to Ensure Communications Integrity. Search on Bibsonomy ICN (2) The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
28Madhu Ahluwalia, Ruchika Gupta, Aryya Gangopadhyay, Yelena Yesha, Michael McAllister Target-based database synchronization. Search on Bibsonomy SAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF change detection capture, database synchronization, databases, synchronization, data warehouse
28Elena Andreeva 0001, Charles Bouillaguet, Orr Dunkelman, John Kelsey Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgård. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Herding attack, Trojan message attack, Zipper hash, Concatenated hash, Tree hash, Second preimage attack
28Vassil Roussev, Golden G. Richard III, Lodovico Marziale Class-Aware Similarity Hashing for Data Classification. (PDF / PS) Search on Bibsonomy IFIP Int. Conf. Digital Forensics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Similarity hashing, class-aware similarity hashing, classprints
28Mythili Vutukuru, Hari Balakrishnan, Vern Paxson Efficient and Robust TCP Stream Normalization. Search on Bibsonomy SP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Intrusion Detection Systems, Normalization, Evasion Attacks
28Wiebren de Jonge, Bart Jacobs 0001 Privacy-Friendly Electronic Traffic Pricing via Commits. Search on Bibsonomy Formal Aspects in Security and Trust The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Shunsuke Mogaki, Masaru Kamada, Tatsuhiro Yonekura, Shusuke Okamoto, Yasuhiro Ohtaki, Mamun Bin Ibne Reaz Time-stamp service makes real-time gaming cheat-free. Search on Bibsonomy NETGAMES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cheat-proofing, real-time network gaming, time-stamp service
28Goce Jakimoski, K. P. Subbalakshmi On Efficient Message Authentication Via Block Cipher Design Techniques. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Wegman-Carter construction, maximum differential probability, block ciphers, Message authentication, universal hash functions
28Zhenyan Li, Yap-Peng Tan Content-based video copy detection with video signature. Search on Bibsonomy ISCAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Vipul Goyal, Ajith Abraham, Sugata Sanyal, Sang-Yong Han The N/R One Time Password System. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Philippe Oechslin Making a Faster Cryptanalytic Time-Memory Trade-Off. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF fixed plaintext, cryptanalysis, precomputation, Time-memory trade-off
28Naomaru Itoi, William A. Arbaugh, Samuela J. Pollack, Daniel M. Reeves Personal Secure Booting. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
28Ted Krovetz, Phillip Rogaway Fast Universal Hashing with Small Keys and No Preprocessing: The PolyR Construction. Search on Bibsonomy ICISC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF software-optimized hashing, UMAC, message authentication, Universal hashing
27Stefan Katzenbeisser 0001, Klaus Kursawe, Joop Talstra Graceful infringement reactions in DRM systems. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2006 DBLP  DOI  BibTeX  RDF device revocation, watermarking, DRM, perceptual hashes
27Paul Beame, Martin Tompa, Peiyuan Yan Communication-Space Tradeoffs for Unrestricted Protocols Search on Bibsonomy FOCS The full citation details ... 1990 DBLP  DOI  BibTeX  RDF communicating branching programs, unrestricted protocols, communication-space tradeoffs, hash functions, hashes, matrix-vector products
23Grant Greenberg, Aditya Narayan Ravi, Ilan Shomorony LexicHash: sequence similarity estimation via lexicographic comparison of hashes. Search on Bibsonomy Bioinform. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Shashank Shekher Tripathi, Volker Skwarek Fuzzified advanced robust hashes for identification of digital and physical objects. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Rudolf Siegel, Rafael Mrowczynski, Maria Hellenthal, Michael Schilling 0001 Poster: From Hashes to Ashes - A Comparison of Transcription Services. Search on Bibsonomy CCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Pavel Novák, Patrik Kaura, Václav Oujezský, Tomás Horváth Ransomware File Detection Using Hashes and Machine Learning. Search on Bibsonomy ICUMT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Sasa Loncarevic, Bruno Skendrovic, Ivan Kovacevic, Stjepan Gros Detecting JavaScript libraries using identifiers and hashes. Search on Bibsonomy MIPRO The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Marius Leon Hammann, Martin Steinebach, Huajian Liu, Niklas Bunzel Predicting positions of flipped bits in robust image hashes. Search on Bibsonomy Media Watermarking, Security, and Forensics The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Haoping Liu, Josiah Hagen, Muqeet Ali, Jonathan Oliver An Evaluation of Malware Triage Similarity Hashes. Search on Bibsonomy ICEIS (1) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Frieder Uhlig, Lukas Struppek, Dominik Hintersdorf, Kristian Kersting Transformer-Boosted Anomaly Detection with Fuzzy Hashes. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Mark Zhandry New Constructions of Collapsing Hashes. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
23Aldo Gunsing, Bart Mennink Collapseability of Tree Hashes. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
23Peter Stolz, Sebastian Roth, Ben Stock To hash or not to hash: A security assessment of CSP's unsafe-hashes expression. Search on Bibsonomy SP (Workshops) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Mark Zhandry New Constructions of Collapsing Hashes. Search on Bibsonomy CRYPTO (3) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Shubhani Aggarwal, Neeraj Kumar 0001 Chapter Three - Hashes. Search on Bibsonomy Adv. Comput. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
23Li Wang, Lilon Wangner Mathematical Models for Local Sensing Hashes. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
23Loganaden Velvindron, Kathleen Moriarty, Alessandro Ghedini Deprecating MD5 and SHA-1 Signature Hashes in TLS 1.2 and DTLS 1.2. Search on Bibsonomy RFC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
23Junpeng Xu, Haixia Chen, Xu Yang, Wei Wu 0001, Yongcheng Song Verifiable image revision from chameleon hashes. Search on Bibsonomy Cybersecur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
23Henri T. Heinonen, Alexander Semenov Recycling Hashes from Reversible Bitcoin Mining to Seed Pseudorandom Number Generators. Search on Bibsonomy ICBC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
23Lizzy Tengana, Jesus Solano, Alejandra Castelblanco, Esteban Rivera, Christian Lopez, Martín Ochoa Centy: Scalable Server-Side Web Integrity Verification System Based on Fuzzy Hashes. Search on Bibsonomy DIMVA The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
23Martin Steinebach, Sebastian Lutz, Huajian Liu Privacy and Robust Hashes Privacy-Preserving Forensics for Image Re-Identification. Search on Bibsonomy J. Cyber Secur. Mobil. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
23Doriane Perard, Xavier Goffin, Jérôme Lacan Using Homomorphic hashes in coded blockchains. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
23Nicholas R. Allgood, Charles K. Nicholas A Quantum Algorithm To Locate Unknown Hashes For Known N-Grams Within A Large Malware Corpus. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
23David Derler, Stephan Krenn, Kai Samelin, Daniel Slamanig Fully Collision-Resistant Chameleon-Hashes from Simpler and Post-Quantum Assumptions. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2020 DBLP  BibTeX  RDF
23David Derler, Kai Samelin, Daniel Slamanig Bringing Order to Chaos: The Case of Collision-Resistant Chameleon-Hashes. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2020 DBLP  BibTeX  RDF
23Batyr Charyyev, Mehmet Hadi Gunes Voice Command Fingerprinting with Locality Sensitive Hashes. Search on Bibsonomy CPSIOTSEC@CCS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
23Aldo Gunsing, Bart Mennink Collapseability of Tree Hashes. Search on Bibsonomy PQCrypto The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
23Batyr Charyyev, Mehmet Hadi Gunes IoT Traffic Flow Identification using Locality Sensitive Hashes. Search on Bibsonomy ICC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
23Petr Matousek, Ivana Burgetova, Ondrej Rysavý, Malombe Victor On Reliability of JA3 Hashes for Fingerprinting Mobile Applications. Search on Bibsonomy ICDF2C The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
23Batyr Charyyev, Mehmet Hadi Gunes Detecting Anomalous IoT Traffic Flow with Locality Sensitive Hashes. Search on Bibsonomy GLOBECOM The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
23David Derler, Kai Samelin, Daniel Slamanig Bringing Order to Chaos: The Case of Collision-Resistant Chameleon-Hashes. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
23David Derler, Stephan Krenn, Kai Samelin, Daniel Slamanig Fully Collision-Resistant Chameleon-Hashes from Simpler and Post-quantum Assumptions. Search on Bibsonomy SCN The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
23Canyang Shi, Huiping Sun HoneyHash: Honeyword Generation Based on Transformed Hashes. Search on Bibsonomy NordSec The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
23Robert L. Bradford, Sofia Dard, Emily R. Pfaff, Ashok K. Krishnamurthy Utilizing Encrypted Hashes to Link Patient Cohorts via Streamlined SAS Programs. Search on Bibsonomy AMIA The full citation details ... 2020 DBLP  BibTeX  RDF
23Ian Shiel, Stephen O'Shaughnessy Improving file-level fuzzy hashes for malware variant classification. Search on Bibsonomy Digit. Investig. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
23Tu Bui, Daniel Cooper, John P. Collomosse, Mark Bell, Alex Green 0002, John Sheridan, Jez Higgins, Arindra Das, Jared Keller 0001, Olivier Thereaux, Alan Brown ARCHANGEL: Tamper-proofing Video Archives using Temporal Content Hashes on the Blockchain. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
23Rishabh Mehta, Naman Kapoor, Soumya Sourav, Rajeev Shorey Decentralised Image Sharing and Copyright Protection using Blockchain and Perceptual Hashes. Search on Bibsonomy COMSNETS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
23Martin Steinebach, Sebastian Lutz, Huajian Liu Privacy and Robust Hashes. Search on Bibsonomy ARES The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
23Sara Migliorini, Mauro Gambini, Carlo Combi, Marcello La Rosa The Rise of Enforceable Business Processes from the Hashes of Blockchain-Based Smart Contracts. Search on Bibsonomy BPMDS/EMMSAD@CAiSE The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
23Tu Bui, Daniel Cooper, John P. Collomosse, Mark Bell, Alex Green 0002, John Sheridan, Jez Higgins, Arindra Das, Jared Keller 0001, Olivier Thereaux, Alan Brown ARCHANGEL: Tamper-Proofing Video Archives Using Temporal Content Hashes on the Blockchain. Search on Bibsonomy CVPR Workshops The full citation details ... 2019 DBLP  BibTeX  RDF
23Samuele Girotto, Matteo Comin, Cinzia Pizzi FSH: fast spaced seed hashing exploiting adjacent hashes. Search on Bibsonomy Algorithms Mol. Biol. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
23Maxim Berman, Matthew B. Blaschko Supermodular Locality Sensitive Hashes. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
23Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig Chameleon-Hashes with Dual Long-Term Trapdoors and Their Applications. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2018 DBLP  BibTeX  RDF
23Yongwei Wang, Hamid Palangi, Z. Jane Wang 0001, Haoqian Wang RevHashNet: Perceptually de-hashing real-valued image hashes for similarity retrieval. Search on Bibsonomy Signal Process. Image Commun. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
23Fabio Pagani, Matteo Dell'Amico, Davide Balzarotti Beyond Precision and Recall: Understanding Uses (and Misuses) of Similarity Hashes in Binary Analysis. Search on Bibsonomy CODASPY The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
23Johan Garcia 0001 Duplications and Misattributions of File Fragment Hashes in Image and Compressed Files. Search on Bibsonomy NTMS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
23Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig Chameleon-Hashes with Dual Long-Term Trapdoors and Their Applications. Search on Bibsonomy AFRICACRYPT The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
23Bernard Vukelic Novi algoritam za izradu percepcijskih sažetaka temeljen na izdvajanju atributa biometrijskih karakteristika ; A novel algorithm for the development of perceptual hashes based on extraction of attributes of biometric characteristics. Search on Bibsonomy 2018   RDF
23Aneesh Sharma, C. Seshadhri 0001, Ashish Goel When Hashes Met Wedges: A Distributed Algorithm for Finding High Similarity Vectors. Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
23Junade Ali Mechanism for the prevention of password reuse through Anonymized Hashes. Search on Bibsonomy PeerJ Prepr. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
23Jan Camenisch, David Derler, Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2017 DBLP  BibTeX  RDF
23Qinghai Gao An approach to matching fingerprints using cryptographic one-way hashes. Search on Bibsonomy Int. J. Biom. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
23Aneesh Sharma, C. Seshadhri 0001, Ashish Goel When Hashes Met Wedges: A Distributed Algorithm for Finding High Similarity Vectors. Search on Bibsonomy WWW The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
23Amanda Lee, Travis Atkison A Comparison of Fuzzy Hashes: Evaluation, Guidelines, and Future Suggestions. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
23Ruiyu Zhu, Yan Huang 0001 JIMU: Faster LEGO-Based Secure Computation Using Additive Homomorphic Hashes. Search on Bibsonomy ASIACRYPT (2) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
23Andreas Fiessler, Daniel Loebenberger, Sven Hager, Björn Scheuermann 0001 On the Use of (Non-)Cryptographic Hashes on FPGAs. Search on Bibsonomy ARC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
23Jan Camenisch, David Derler, Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig Chameleon-Hashes with Ephemeral Trapdoors - And Applications to Invisible Sanitizable Signatures. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
23Alberto Rivas, Pablo Chamoso, Javier J. Martín-Limorti, Sara Rodríguez 0001, Fernando de la Prieta, Javier Bajo Image Matching Algorithm Based on Hashes Extraction. Search on Bibsonomy EPIA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
23Rong Wang, Hao Chen 0002, Jianhua Sun 0002 Phoney: protecting password hashes with threshold cryptology and honeywords. Search on Bibsonomy Int. J. Embed. Syst. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
23Kave Eshghi, Mehran Kafai The CRO kernel: Using Concomitant Rank Order hashes for sparse high dimensional randomized feature maps. Search on Bibsonomy ICDE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
23Ibrahim Lazrig, Toan Ong, Indrajit Ray, Indrakshi Ray, Michael G. Kahn Privacy Preserving Probabilistic Record Linkage Using Locality Sensitive Hashes. Search on Bibsonomy DBSec The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
23Hwei-Ming Ying, Noboru Kunihiro Decryption of Frequent Password Hashes in Rainbow Tables. Search on Bibsonomy CANDAR The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
23Emin Islam Tatli Cracking More Password Hashes With Patterns. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
23Christian Winter 0001, Martin Steinebach, York Yannikos Fast indexing strategies for robust image hashes. Search on Bibsonomy Digit. Investig. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
23Mehran Kafai, Kave Eshghi, Bir Bhanu Discrete Cosine Transform Locality-Sensitive Hashes for Face Retrieval. Search on Bibsonomy IEEE Trans. Multim. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
23Pai-Chou Wang Dynamic Reducts Generation using Cascading Hashes. Search on Bibsonomy Int. J. Found. Comput. Sci. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
23Rene Romann, Ralf Salomon Salted hashes for message authentication - proof of concept on tiny embedded systems. Search on Bibsonomy IES The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
23Shuying Liang, Weibin Sun, Matthew Might Fast Flow Analysis with Godel Hashes. Search on Bibsonomy SCAM The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
23Stephen Farrell, Dirk Kutscher, Christian Dannewitz, Börje Ohlman, Ari Keränen, Phillip M. Hallam-Baker Naming Things with Hashes. Search on Bibsonomy RFC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
23Xudong Lv, Z. Jane Wang 0001 Compressed Binary Image Hashes Based on Semisupervised Spectral Embedding. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
23Stefan Rass Dynamic Proofs of Retrievability from Chameleon-Hashes. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
23Joel Young, Kristina Foster, Simson L. Garfinkel, Kevin D. Fairbanks Distinct Sector Hashes for Target File Detection. Search on Bibsonomy Computer The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Michael C. Turchin, Joel Hirschhorn Gencrypt: one-way cryptographic hashes to detect overlapping individuals across samples. Search on Bibsonomy Bioinform. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Wesley Jin, Sagar Chaki, Cory F. Cohen, Arie Gurfinkel, Jeffrey Havrilla, Charles Hines, Priya Narasimhan Binary Function Clustering Using Semantic Hashes. Search on Bibsonomy ICMLA (1) The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Markku-Juhani Olavi Saarinen Cycling Attacks on GCM, GHASH and Other Polynomial MACs and Hashes. Search on Bibsonomy FSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 201 (100 per page; Change: )
Pages: [1][2][3][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license