共 50 条
- [31] An Efficient Broadcast Algorithm in Distribued Hash Table under Churn 2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 1929 - +
- [32] Secure Hash Algorithm Based on Efficient Chaotic Neural Network 2016 INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM 2016), 2016, : 405 - 410
- [33] An Efficient Parallel Algorithm for Hash Computation in Security and Forensics Applications SOUVENIR OF THE 2014 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2014, : 873 - 877
- [34] An Efficient Circuit Matching Algorithm Based on Hash Extraction of Features 2024 INTERNATIONAL SYMPOSIUM OF ELECTRONICS DESIGN AUTOMATION, ISEDA 2024, 2024, : 222 - 228
- [35] An efficient routing algorithm to preserve -coverage in wireless sensor networks JOURNAL OF SUPERCOMPUTING, 2014, 68 (02): : 599 - 623
- [36] Optimal parameter selection for efficient memory integrity verification using Merkle hash trees THIRD IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS, PROCEEDINGS, 2004, : 383 - 388
- [37] PN-HASH: An Immune-Inspired Scheme for Data Integrity Check 2020 12TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTATIONAL INTELLIGENCE (ICACI), 2020, : 340 - 348
- [38] A Cluster-based Protocol To Enforce Integrity and Preserve Privacy in Data Aggregation ICDCS: 2009 INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS, 2009, : 14 - +
- [39] IMSet-SHA3-Tree: the Efficient Data Integrity Verification Based on SHA3 and MSet-XOR-Hash IEEE 12TH INT CONF UBIQUITOUS INTELLIGENCE & COMP/IEEE 12TH INT CONF ADV & TRUSTED COMP/IEEE 15TH INT CONF SCALABLE COMP & COMMUN/IEEE INT CONF CLOUD & BIG DATA COMP/IEEE INT CONF INTERNET PEOPLE AND ASSOCIATED SYMPOSIA/WORKSHOPS, 2015, : 460 - 467