ARTÍCULO
TITULO

Hashing Methods for Temporal Data

Kollios    
G. Tsotras    
V. J.    

Resumen

No disponible

 Artículos similares

       
 
Ling Du, Zehong He, Yijing Wang, Xiaochao Wang and Anthony T. S. Ho    
Image hashing-based authentication methods have been widely studied with continuous advancements owing to the speed and memory efficiency. However, reference hash generation and threshold setting, which are used for similarity measures between original i... ver más
Revista: Algorithms

 
Smruti Chourasia,Hrishikesh Bharadwaj Chakrapani,Queenie Das,Krati Agarwal,Lavanya K    
The communication boom in the past few decades has resulted in a large flow of data. This entails the need for having high security and privacy with regards to data confidentiality and authenticity. One method of doing so is by utilizing a synchronized k... ver más

 
Nubila Nabeel,Mohamed Hadi Habaebi,Nurul Arfah Che Mustapha,Md Rafiqul Islam     Pág. pp. 117 - 129
We are in the era of IoT and 5G technologies. IoT has wide range of applications in Smart Home, Smart cities, Agriculture, Health etc. Due to that, the number of connected sensor devices become increased. Along with that security of these devices become ... ver más