Hashing

Results: 1317



#Item
581Cryptographic hash functions / Mathematics / Information retrieval / Error detection and correction / Hash function / Hash table / Key derivation function / Tabulation hashing / Rainbow table / Search algorithms / Cryptography / Hashing

STRONGER KEY DERIVATION VIA SEQUENTIAL MEMORY-HARD FUNCTIONS COLIN PERCIVAL Abstract. We introduce the concepts of memory-hard algorithms and sequential memory-hard functions, and argue that in order for key derivation f

Add to Reading List

Source URL: www.tarsnap.com

Language: English - Date: 2013-12-11 18:35:17
582Distributed computing / Chord / Distributed hash table / Peer-to-peer / Node / Scalability / Consistent hashing / Shared nothing architecture / Routing / Distributed data storage / Computing / Concurrent computing

Scaling a Highly-Available DBMS beyond a Dozen Nodes Svein Erik Bratsberg Department of Computer and Information Science Norwegian Universitity of Science and Technology N-7491 Trondheim, Norway

Add to Reading List

Source URL: www.nik.no

Language: English - Date: 2004-12-12 14:17:11
583Search algorithms / Analysis of algorithms / Probability theory / Hashing / Approximate counting algorithm / Randomized algorithm / Bloom filter / Estimation theory / Hash table / Mathematics / Applied mathematics / Theoretical computer science

Counting by Coin Tossings Philippe Flajolet Algorithms Project, INRIA-Rocquencourt, 78153 Le Chesnay (France) [removed] Abstract. This text is an informal review of several randomized algorithms that ha

Add to Reading List

Source URL: algo.inria.fr

Language: English - Date: 2004-09-28 13:04:59
584Cryptographic software / Computer law / Password cracking / Password / Rainbow table / Salt / Key stretching / Crypt / Bcrypt / Cryptography / Cryptographic hash functions / Key management

Password Hashing Competition - Survey and Benchmark George Hatzivasilis1 , Ioannis Papaefstathiou1 , and Charalampos Manifavas2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-22 05:43:55
585One-time password / Password / Keystroke logging / Two-factor authentication / Salt / Transaction authentication number / Malware / Key derivation function / Password cracking / Security / Computer security / Cryptography

How does two-factor authentication protect my users? Passwords are not strong enough for secure authentication on the web anymore. Even with complicated requirements and heavy hashing, passwords remain vulnerable to comm

Add to Reading List

Source URL: getclef.com

Language: English - Date: 2015-04-10 13:24:37
586Artificial intelligence / Locality-sensitive hashing / Hash function / Hash table / Nearest neighbor search / Tiny Encryption Algorithm / Cryptographic hash function / Search algorithms / Information science / Information retrieval

SK-LSH : An Efficient Index Structure for Approximate Nearest Neighbor Search Yingfan Liu‡ , Jiangtao Cui‡ , Zi Huang§ , Hui Li‡ , Heng Tao Shen§ ‡ School of Computer, Xidian University, China

Add to Reading List

Source URL: www.vldb.org

Language: English - Date: 2014-04-05 17:13:23
587Hashing / Search algorithms / Error detection and correction / Hash function

4/9/15   Case  Study  1:  Es.ma.ng  Click  Probabili.es   Tackling  an  Unknown  Number  of   Features  with  Sketching    

Add to Reading List

Source URL: courses.cs.washington.edu

Language: English - Date: 2015-04-09 14:36:56
588Cluster analysis / Hashing / Data mining / Data stream clustering / K-means clustering / Count-Min sketch / Segmentation / Pattern recognition / Determining the number of clusters in a data set / Statistics / Machine learning / Multivariate statistics

A Framework for Clustering Massive-Domain Data Streams Charu C. Aggarwal IBM T. J. Watson Research Center 19 Skyline Drive, Hawthorne, NY, USA [removed]

Add to Reading List

Source URL: charuaggarwal.net

Language: English - Date: 2009-03-29 23:59:19
589Hashing / Search algorithms / Error detection and correction / Hash function

4/7/15   Case  Study  1:  Es.ma.ng  Click  Probabili.es   Tackling  an  Unknown  Number  of   Features  with  Sketching    

Add to Reading List

Source URL: courses.cs.washington.edu

Language: English - Date: 2015-04-08 01:58:26
590Mathematical analysis / Mathematics / Information science / Operator theory / Error detection and correction / Hash function / Reproducing kernel Hilbert space / Bloom filter / Positive-definite kernel / Hashing / Search algorithms / Hilbert space

Journal of Machine Learning Research[removed]xxx-xxx Submitted 02/09; Published[removed]Hash Kernels for Structured Data Qinfeng Shi

Add to Reading List

Source URL: www2.mta.ac.il

Language: English - Date: 2009-04-16 20:45:48
UPDATE