The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Hash with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1968-1973 (17) 1974-1977 (20) 1978-1980 (18) 1981-1982 (16) 1983-1984 (19) 1985 (16) 1986-1987 (16) 1988-1989 (33) 1990 (33) 1991 (27) 1992 (38) 1993 (28) 1994 (44) 1995 (33) 1996 (36) 1997 (47) 1998 (42) 1999 (62) 2000 (56) 2001 (85) 2002 (139) 2003 (183) 2004 (329) 2005 (415) 2006 (468) 2007 (493) 2008 (494) 2009 (456) 2010 (240) 2011 (205) 2012 (223) 2013 (226) 2014 (182) 2015 (188) 2016 (241) 2017 (229) 2018 (227) 2019 (260) 2020 (232) 2021 (255) 2022 (304) 2023 (278) 2024 (60)
Publication types (Num. hits)
article(2517) book(3) incollection(69) inproceedings(4361) phdthesis(63)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 3717 occurrences of 1502 keywords

Results
Found 7025 publication records. Showing 7013 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
20Peter Brass Universal hash functions for an infinite universe and hash trees. Search on Bibsonomy Inf. Process. Lett. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Dhananjoy Dey, Prasanna Raghaw Mishra, Indranath Sen Gupta HF-hash : Hash Functions Using Restricted HFE Challenge-1 Search on Bibsonomy CoRR The full citation details ... 2009 DBLP  BibTeX  RDF
20A. T. Akinwale, F. T. Ibharalu The Usefulness of Multilevel Hash Tables with Multiple Hash Functions in Large Databases Search on Bibsonomy CoRR The full citation details ... 2009 DBLP  BibTeX  RDF
20Giacomo de Meulenaer, Christophe Petit 0001, Jean-Jacques Quisquater Hardware Implementations of a Variant of the Zémor-Tillich Hash Function: Can a Provably Secure Hash Function be very efficient ? Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2009 DBLP  BibTeX  RDF
20Sebastiaan Indesteege, Bart Preneel Coding Theory and Hash Function Design - A Case Study: The Lane Hash Function. Search on Bibsonomy Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Sheena Mathew, K. Poulose Jacob JERIM-320: A new 320-Bit Hash Function Compared to Hash Functions with Parallel Branches. Search on Bibsonomy Int. J. Comput. Sci. Appl. The full citation details ... 2008 DBLP  BibTeX  RDF
20Mridul Nandi Improving upon HCTR and matching attacks for Hash-Counter-Hash approach. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2008 DBLP  BibTeX  RDF
20Jonathan J. Hoch, Adi Shamir On the Strength of the Concatenated Hash Combiner when All the Hash Functions are Weak. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2008 DBLP  BibTeX  RDF
20Debrup Chakraborty, Palash Sarkar 0001 HCH: A New Tweakable Enciphering Scheme Using the Hash-Counter-Hash Approach. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2007 DBLP  BibTeX  RDF
20Olaf Landsiedel, Tobias Heer, Klaus Wehrle MHT: Eine mobilitätsbewusste verteilte Hash-Tabelle (MHT: A Mobility-aware Distributed Hash Table). Search on Bibsonomy it Inf. Technol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Bart Preneel Mash Hash Functions (Modular Arithmetic Secure Hash). Search on Bibsonomy Encyclopedia of Cryptography and Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Duo Lei F-HASH: Securing Hash Functions Using Feistel Chaining. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2005 DBLP  BibTeX  RDF
20Harris E. Michail, Athanasios P. Kakarountas, Athanasios Milidonis, Costas E. Goutis Efficient implementation of the keyed-hash message authentication code (HMAC) using the SHA-1 hash function. Search on Bibsonomy ICECS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
20Türker Özsari A Hash of Hash Functions Search on Bibsonomy CoRR The full citation details ... 2003 DBLP  BibTeX  RDF
20Guy M. Lohman Review - Hash Joins and Hash Teams in Microsoft SQL Server. Search on Bibsonomy ACM SIGMOD Digit. Rev. The full citation details ... 2000 DBLP  BibTeX  RDF
20Alfons Kemper Review - Hash Joins and Hash Teams in Microsoft SQL Server. Search on Bibsonomy ACM SIGMOD Digit. Rev. The full citation details ... 1999 DBLP  BibTeX  RDF
20Luc Devroye The Height and Size of Random Hash Trees and Random Pebbled Hash Trees. Search on Bibsonomy SIAM J. Comput. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
20Goetz Graefe, Ross Bunker, Shaun Cooper Hash Joins and Hash Teams in Microsoft SQL Server. Search on Bibsonomy VLDB The full citation details ... 1998 DBLP  BibTeX  RDF
20Evan P. Harris, Kotagiri Ramamohanarao Using Optimized Multi-Attribute Hash Indexes for Hash Joins. Search on Bibsonomy Australasian Database Conference The full citation details ... 1994 DBLP  BibTeX  RDF
20James K. Mullin Hash Functions for Hash-based Join Methods. Search on Bibsonomy Comput. J. The full citation details ... 1992 DBLP  BibTeX  RDF
20Masaru Kitsuregawa, Yasushi Ogawa Bucket Spreading Parallel Hash: A New, Robust, Parallel Hash Join Method for Data Skew in the Super Database Computer (SDC). Search on Bibsonomy VLDB The full citation details ... 1990 DBLP  BibTeX  RDF
20Wei-Pang Yang, M. W. Du A Dynamic Perfect Hash Function Defined by an Extended Hash Indicator Table. Search on Bibsonomy VLDB The full citation details ... 1984 DBLP  BibTeX  RDF
16Rui Zhou 0001, Chengfei Liu, Jianxin Li 0001 Fast ELCA computation for keyword queries on XML data. Search on Bibsonomy EDBT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
16Jooyoung Lee 0001, Daesung Kwon Tree-based key predistribution for wireless sensor networks. Search on Bibsonomy Wirel. Networks The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Wireless sensor network, Tree structure, Key predistribution
16Atilla Elçi, Behnam Rahnama AWGN based seed for random noise generator in ParseKey+. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF imperfect use of timestamp, parsekey+, side channel attack, awgn
16Martin Dietzfelbinger, Stefan Edelkamp Perfect Hashing for State Spaces in BDD Representation. Search on Bibsonomy KI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Florian Mendel, Tomislav Nad, Martin Schläffer Collision Attack on Boole. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Beata Sarna-Starosta, Tom Schrijvers Attributed Data for CHR Indexing. Search on Bibsonomy ICLP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF term representation, attributed variables, indexing, program transformation, Constraint Handling Rules
16Jean-Philippe Aumasson, Çagdas Çalik, Willi Meier, Onur Özen, Raphael C.-W. Phan, Kerem Varici Improved Cryptanalysis of Skein. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Ahto Buldas, Aivo Jürgenson, Margus Niitsoo Efficiency Bounds for Adversary Constructions in Black-Box Reductions. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Jiang Wu 0001, Douglas R. Stinson A Highly Scalable RFID Authentication Protocol. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Onur Özen, Martijn Stam Another Glance at Double-Length Hashing. Search on Bibsonomy IMACC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Giovanni Di Crescenzo, Shaoquan Jiang, Reihaneh Safavi-Naini Corruption-Localizing Hashing. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Gaëtan Leurent, Phong Q. Nguyen How Risky Is the Random-Oracle Model? Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Noga Alon, Shai Gutner Balanced Hashing, Color Coding and Approximate Counting. Search on Bibsonomy IWPEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Approximate counting of subgraphs, derandomization, expanders, perfect hashing, color-coding, k-wise independence
16Morten Skaarup Jensen, Rasmus Pagh Optimality in External Memory Hashing. Search on Bibsonomy Algorithmica The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Index, Hashing, Dictionary, External memory
16Zoi Kaoudi, Iris Miliaraki, Manolis Koubarakis RDFS Reasoning and Query Answering on Top of DHTs. Search on Bibsonomy ISWC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Hiroaki Hazeyama, Yoshihide Matsumoto, Youki Kadobayashi Design of an FDB based Intra-domain Packet Traceback System. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Intra Domain, Forwarding Data Base, Security, IP Traceback
16Viet Yen Nguyen, Theo C. Ruys Incremental Hashing for Spin. Search on Bibsonomy SPIN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Maurice Herlihy, Nir Shavit, Moran Tzafrir Hopscotch Hashing. Search on Bibsonomy DISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Phillip Rogaway, John P. Steinberger Security/Efficiency Tradeoffs for Permutation-Based Hashing. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Yu Hua 0001, Bin Xiao 0001, Dan Feng 0001, Bo Yu 0019 Bounded LSH for Similarity Search in Peer-to-Peer File Systems. Search on Bibsonomy ICPP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Krzysztof Pietrzak Compression from Collisions, or Why CRHF Combiners Have a Long Output. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Simon Rieche, Bui The Vinh, Klaus Wehrle Range queries and load balancing in a hierarchically structured P2P system. Search on Bibsonomy LCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Ge Nong, Sen Zhang Efficient Algorithms for the Inverse Sort Transform. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2007 DBLP  DOI  BibTeX  RDF inverse sort transform, limit-order contexts, data compression, algorithm design, Burrows-Wheeler transform
16Daniel Sánchez 0003, Luke Yen, Mark D. Hill, Karthikeyan Sankaralingam Implementing Signatures for Transactional Memory. Search on Bibsonomy MICRO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Miguel Jimeno, Kenneth J. Christensen, Allen Roginsky A Power Management Proxy with a New Best-of-N Bloom Filter Design to Reduce False Positives. Search on Bibsonomy IPCCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Mathias Eitz, Lixu Gu Hierarchical Spatial Hashing for Real-time Collision Detection. Search on Bibsonomy Shape Modeling International The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Shijun Xiang, Hyoung-Joong Kim, Jiwu Huang Histogram-based image hashing scheme robust against geometric deformations. Search on Bibsonomy MM&Sec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF geometric deformation, robustness, histogram, gaussian filter, image hashing
16Kengo Terasawa, Yuzuru Tanaka Spherical LSH for Approximate Nearest Neighbor Search on Unit Hypersphere. Search on Bibsonomy WADS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Shuai Hao, Hock-Beng Lim Data Synchronization in Distributed and Constrained Mobile Sensor Networks. Search on Bibsonomy UIC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Yong Ki Lee, Herwin Chan, Ingrid Verbauwhede Iteration Bound Analysis and Throughput Optimum Architecture of SHA-256 (384, 512) for Hardware Implementations. Search on Bibsonomy WISA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF SHA-256 (384,512), Iteration Bound Analysis, Throughput Optimum Architecture
16Palash Sarkar 0001 Improving Upon the TET Mode of Operation. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF tweakable encryption, strong pseudo-random permutation, disk encryption, modes of operations
16Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Reouven Elbaz, David Champagne, Ruby B. Lee, Lionel Torres, Gilles Sassatelli, Pierre Guillemin TEC-Tree: A Low-Cost, Parallelizable Tree for Efficient Defense Against Memory Replay Attacks. Search on Bibsonomy CHES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Memory Integrity, Physical Attacks, Tamper Evidence, Parallelizability, Confidentiality, Replay Attacks, Merkle Trees
16Iftach Haitner, Omer Reingold A New Interactive Hashing Theorem. Search on Bibsonomy CCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Fong Pong, Nian-Feng Tzeng Storage-Efficient Architecture for Routing Tables via Prefix Transformation. Search on Bibsonomy LCN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Chen Wang 0010, Li Xiao 0001, Yunhao Liu 0001, Pei Zheng DiCAS: An Efficient Distributed Caching Mechanism for P2P Systems. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF query response, distributed caching and adaptive search, Peer-to-peer, flooding, search efficiency
16Yongdong Wu Tamper-Localization Watermarking with Systematic Error Correcting Code. Search on Bibsonomy ICIP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Ayoub Massoudi, Frédéric Lefèbvre, Claire-Hélène Demarty, Lionel Oisel, Bertrand Chupeau A Video Fingerprint Based on Visual Digest and Local Fingerprints. Search on Bibsonomy ICIP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Micah Lewis, Michael Jones A dead variable analysis for explicit model checking. Search on Bibsonomy PEPM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Fabrício Benevenuto, Cristiano P. Costa, Marisa A. Vasconcelos, Virgílio A. F. Almeida, Jussara M. Almeida, Miranda Mowbray Impact of peer incentives on the dissemination of polluted content. Search on Bibsonomy SAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF content pollution, peer incentive, peer-to-peer networks
16Adam Kirsch, Michael Mitzenmacher Less Hashing, Same Performance: Building a Better Bloom Filter. Search on Bibsonomy ESA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Praveen Kumar Vadnala, Anish Mathuria An Efficient Key Assignment Scheme for Access Control in a Hierarchy. Search on Bibsonomy ICISS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Pierre-Malo Deniélou, James J. Leifer Abstraction preservation and subtyping in distributed languages. Search on Bibsonomy ICFP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF serialisation and distributed computation, subtyping, type theory, programming language semantics, module systems
16Mikhail J. Atallah, Marina Blanton, Keith B. Frikken Key management for non-tree access hierarchies. Search on Bibsonomy SACMAT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF access hierarchy, dimension of a graph, fast key derivation
16Aditi Pandit, Himanshu Gupta 0001 Communication-Efficient Implementation of Range-Joins in Sensor Networks. Search on Bibsonomy DASFAA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Bin Wang, Zhiwei Li 0006, Mingjing Li, Wei-Ying Ma Large-Scale Duplicate Detection for Web Image Search. Search on Bibsonomy ICME The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Jeong Ok Kwon, Ik Rae Jeong, Dong Hoon Lee 0001 Provably-Secure Two-Round Password-Authenticated Group Key Exchange in the Standard Model. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Florian Mendel, Bart Preneel, Vincent Rijmen, Hirotaka Yoshida, Dai Watanabe Update on Tiger. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Qiming Li, Dah-Ming Chiu, John C. S. Lui On the Practical and Security Issues of Batch Content Distribution Via Network Coding. Search on Bibsonomy ICNP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Jongsung Kim, Alex Biryukov, Bart Preneel, Seokhie Hong On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract). Search on Bibsonomy SCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Sylvain Pasini, Serge Vaudenay An Optimal Non-interactive Message Authentication Protocol. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Michael Backes 0001, Birgit Pfitzmann, Michael Waidner Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Byeong-Seob You, Dong-Wook Lee, Sang Hun Eo, Jae-dong Lee, Hae-Young Bae Hybrid Index for Spatio-temporal OLAP Operations. Search on Bibsonomy ADVIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Aggregation R-tree, OLAP, Spatio-Temporal, Spatial Data Warehouse
16Mihir Bellare New Proofs for NMAC and HMAC: Security without collision-resistance. Search on Bibsonomy CRYPTO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Simon Rieche, Klaus Wehrle, Leo Petrak, Clemens Wrzodek Cerco: Supporting Range Queries with a Hierarchically Structured Peer-to-Peer System. Search on Bibsonomy LCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Daniel R. L. Brown Generic Groups, Collision Resistance, and ECDSA. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF digital signatures, provable security, public key cryptography
16Cédric De Roover, Christophe De Vleeschouwer, Frédéric Lefèbvre, Benoît Macq Robust image hashing based on radial variance of pixels. Search on Bibsonomy ICIP (3) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Yevgeniy Dodis, Adam D. Smith Entropic Security and the Encryption of High Entropy Messages. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Martin Dietzfelbinger, Christoph Weidling Balanced Allocation and Dictionaries with Tightly Packed Constant Size Bins. Search on Bibsonomy ICALP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Yasunobu Nohara, Sozo Inoue, Kensuke Baba, Hiroto Yasuura Quantitative evaluation of unlinkable ID matching schemes. Search on Bibsonomy WPES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF degree of unlinkability, k-steps ID matching, privacy, RFID security
16Haojun Wang, Roger Zimmermann, Wei-Shinn Ku ASPEN: an adaptive spatial peer-to-peer network. Search on Bibsonomy GIS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF distributed spatial databases, peer-to-peer systems
16Lars R. Knudsen, John Erik Mathiassen Preimage and Collision Attacks on MD2. Search on Bibsonomy FSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Sasa Rudan, Aleksandra Kovacevic, Charles A. Milligan, Veljko M. Milutinovic Data Assurance in a Conventional File Systems. Search on Bibsonomy HICSS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Yusuke Doi, Shirou Wakayama, Masahiro Ishiyama, Satoshi Ozaki, Atsushi Inoue Kallima: A Tag-Reader Protocol for Privacy Enhanced RFID System. Search on Bibsonomy EUC Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Miao Ma Mitigating Denial of Service Attacks with Password Puzzles. Search on Bibsonomy ITCC (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16José Rufino, Albano Alves, José Exposto, António Pina A Cluster Oriented Model for Dynamically Balanced DHTs. Search on Bibsonomy IPDPS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16A. Murat Fiskiran, Ruby B. Lee Runtime Execution Monitoring (REM) to Detect and Prevent Malicious Code Execution. Search on Bibsonomy ICCD The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Il-Sun You, Kyungsan Cho A Security Proxy Based Protocol for Authenticating the Mobile IPv6 Binding Updates. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Mipv6 Binding Update Protocol, CAM-DH, CGA
16Jun Li, Minho Sung, Jun (Jim) Xu, Li (Erran) Li Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation. Search on Bibsonomy S&P The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Changxun Wu, Randal C. Burns Achieving Performance Consistency in Heterogeneous Clusters. Search on Bibsonomy HPDC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Henri Gilbert, Helena Handschuh Security Analysis of SHA-256 and Sisters. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
16Satish Narayanasamy, Timothy Sherwood, Suleyman Sair, Brad Calder, George Varghese Catching Accurate Profiles in Hardwar. Search on Bibsonomy HPCA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
16Sumit Ganguly, Minos N. Garofalakis, Rajeev Rastogi Processing Set Expressions over Continuous Update Streams. Search on Bibsonomy SIGMOD Conference The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
16Kun Suk Kim, Sartaj Sahni IP Lookup By Binary Search On Prefix Length. Search on Bibsonomy ISCC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF router tables, binary search on length, dynamic programming, Packet routing, longest-prefix matching, controlled prefix expansion
16Chai Wah Wu On the design of content-based multimedia authentication systems. Search on Bibsonomy IEEE Trans. Multim. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
16Veerle Desmet, Bart Goeman, Koenraad De Bosschere Independent Hashing as Confidence Mechanism for Value Predictors in Microprocessors. Search on Bibsonomy Euro-Par The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
16Yevgeniy Dodis, Leonid Reyzin On the Power of Claw-Free Permutations. Search on Bibsonomy SCN The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
16Charles C. Y. Lam, Guang Gong, Scott A. Vanstone Message Authentication Codes with Error Correcting Capabilities. Search on Bibsonomy ICICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Error Correcting Codes, Message Authentication Codes
Displaying result #801 - #900 of 7013 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license