|
|
|
Adil Redaoui, Amina Belalia and Kamel Belloulata
Deep network-based hashing has gained significant popularity in recent years, particularly in the field of image retrieval. However, most existing methods only focus on extracting semantic information from the final layer, disregarding valuable structura...
ver más
|
|
|
|
|
|
|
Manar Aldaoud, Dawood Al-Abri, Medhat Awadalla and Firdous Kausar
Named Data Networking (NDN) is a future Internet architecture that requires an Inter-Domain Routing (IDR) to route its traffic globally. Address resolution is a vital component of any IDR system that relies on a Domain Name System (DNS) resolver to trans...
ver más
|
|
|
|
|
|
|
Dereje Regassa, Heon Young Yeom and Junseok Hwang
Recent advancements in memory technology have opened up a wealth of possibilities for innovation in data structures. The emergence of byte-addressable persistent memory (PM) with its impressive capacity and low latency has accelerated the adoption of PM ...
ver más
|
|
|
|
|
|
|
Hasan Hashim, Ahmad Reda Alzighaibi, Amaal Farag Elessawy, Ibrahim Gad, Hatem Abdul-Kader and Asmaa Elsaid
A zero-confirmation transaction is a transaction that has not yet been confirmed on the blockchain and is not yet part of the blockchain. The network propagates zero-confirmation transactions quickly, but they are not secured against double-spending atta...
ver más
|
|
|
|
|
|
|
S. Velliangiri, P. Karthikeyan, Vinayakumar Ravi, Meshari Almeshari and Yasser Alzamil
Medical service providers generate many healthcare records containing sensitive and private information about a patient?s health. The patient can allow healthcare service providers to generate healthcare data, which can be stored with healthcare service ...
ver más
|
|
|
|
|
|
|
Ibrahim Shawky Farahat, Waleed Aladrousy, Mohamed Elhoseny, Samir Elmougy and Ahmed Elsaid Tolba
The Internet of Medical Things (IoMT) uses wireless networks to help patients to communicate with healthcare professionals. Therefore, IoMT devices suffer from a lack of security controls, just like many Internet of Things (IoT) gadgets. Thus, in this pa...
ver más
|
|
|
|
|
|
|
Argyrios Sideris and Minas Dasygenis
Information is transmitted between multiple insecure routing hops in text, image, video, and audio. Thus, this multi-hop digital data transfer makes secure transmission with confidentiality and integrity imperative. This protection of the transmitted dat...
ver más
|
|
|
|
|
|
|
Ketan Dalal, Luc Devroye and Ebrahim Malalla
Linear probing continues to be one of the best practical hashing algorithms due to its good average performance, efficiency, and simplicity of implementation. However, the worst-case performance of linear probing seems to degrade with high load factors d...
ver más
|
|
|
|
|
|
|
Wenxiao Li, Hongyan Mei, Yutian Li, Jiayao Yu, Xing Zhang, Xiaorong Xue and Jiahao Wang
Due to the fast retrieval speed and low storage cost, cross-modal hashing has become the primary method for cross-modal retrieval. Since the emergence of deep cross-modal hashing methods, cross-modal retrieval significantly improved. However, the existin...
ver más
|
|
|
|
|
|
|
Mario Alviano
Client puzzle protocols are widely adopted mechanisms for defending against resource exhaustion denial-of-service (DoS) attacks. Among the simplest puzzles used by such protocols, there are cryptographic challenges requiring the finding of hash values wi...
ver más
|
|
|
|