共 50 条
- [42] An Efficient Parallel Algorithm for Hash Computation in Security and Forensics Applications SOUVENIR OF THE 2014 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2014, : 873 - 877
- [43] Encryption and Hash based Security in Internet of Things 2015 3RD INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMMUNICATION AND NETWORKING (ICSCN), 2015,
- [45] Printout Verification Using a New Image Hash Algorithm Based on Radon, Wavelet, and Fast Fourier Transforms PROCEEDINGS 5TH IEEE INTERNATIONAL CONFERENCE ON CONTROL SYSTEM, COMPUTING AND ENGINEERING (ICCSCE 2015), 2015, : 395 - 400
- [46] A Verification Algorithm of Network Security Policy Repository 2009 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND COMPUTER SCIENCE, VOL 1, PROCEEDINGS, 2009, : 297 - 300
- [49] Hash-Based Rule Mining Algorithm in Data-Intensive Homogeneous Cloud Environment PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION TECHNOLOGIES, IC3T 2015, VOL 1, 2016, 379 : 21 - 27
- [50] Enhance Neighbor Discovery Protocol Security by Using Secure Hash Algorithm 4TH INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING (IC)2, 2021, : 777 - 784