167   Artículos

 
en línea
Yesid Díaz Gutiérrez, Juan Manuel Cueva Lovelle     Pág. 82 - 87
ResumenDescargasReferenciasCómo citar
Revista: Redes de IngenierÍ­a    Formato: Electrónico

 
en línea
Muhammad Bin Saif, Sara Migliorini and Fausto Spoto    
Blockchain technology has been successfully applied in recent years to promote the immutability, traceability, and authenticity of previously collected and stored data. However, the amount of data stored in the blockchain is usually limited for economic ... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Shunfang Hu, Shaoping Jiang, Qing Miao, Fan Yang, Weihong Zhou and Peng Duan    
With the rise of the Internet of Things (IoT), maintaining data confidentiality and protecting user privacy have become increasingly challenging. End devices in the IoT are often deployed in unattended environments and connected to open networks, making ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Adil Redaoui, Amina Belalia and Kamel Belloulata    
Deep network-based hashing has gained significant popularity in recent years, particularly in the field of image retrieval. However, most existing methods only focus on extracting semantic information from the final layer, disregarding valuable structura... ver más
Revista: Information    Formato: Electrónico

 
en línea
Mario Alviano    
Client puzzle protocols are widely adopted mechanisms for defending against resource exhaustion denial-of-service (DoS) attacks. Among the simplest puzzles used by such protocols, there are cryptographic challenges requiring the finding of hash values wi... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Hongming Li, Lilai Zhang, Hao Cao and Yirui Wu    
Deoxyribonucleic Acid (DNA) computing has demonstrated great potential in data encryption due to its capability of parallel computation, minimal storage requirement, and unbreakable cryptography. Focusing on high-dimensional image data for encryption wit... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Wenxiao Li, Hongyan Mei, Yutian Li, Jiayao Yu, Xing Zhang, Xiaorong Xue and Jiahao Wang    
Due to the fast retrieval speed and low storage cost, cross-modal hashing has become the primary method for cross-modal retrieval. Since the emergence of deep cross-modal hashing methods, cross-modal retrieval significantly improved. However, the existin... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Zixuan Guo, Qing Xie, Song Liu and Xiaoyao Xie    
This research addresses an essential component in the practical application of NeRF by working toward enhancing the reconstruction efficiency, especially in scenarios without precise pose estimation. The improvements presented in this research underscore... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Shams Mhmood Abd Ali, Mohd Najwadi Yusoff and Hasan Falah Hasan    
The continuous advancements of blockchain applications impose constant improvements on their technical features. Particularly immutability, a highly secure blockchain attribute forbidding unauthorized or illicit data editing or deletion, which functions ... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Argyrios Sideris, Theodora Sanida and Minas Dasygenis    
Hash functions are an essential mechanism in today?s world of information security. It is common practice to utilize them for storing and verifying passwords, developing pseudo-random sequences, and deriving keys for various applications, including milit... ver más
Revista: Information    Formato: Electrónico

« Anterior     Página: 1 de 11     Siguiente »