Spelling suggestions: "subject:"hashing"" "subject:"ashing""
21 |
Investigation of cryptographic algorithms for the transfer of financial informationMartynenko, Mykola January 2010 (has links)
The purpose of the investigation is to determine the most effective solution, which allows safe storing and transmitting of financial information in terms of execution speed, resistance to hacking and ease of implementation. Research object is subject area related to the transfer of encrypted financial information like: encryption algorithms, algorithm of hashing functions, algorithm of electronic digital signature. The result of research is the software implementation of the server and client for sending encrypted information. Also client could only encrypt/decrypt information. The main part of research is to find the most suitable algorithm for transfer of encrypted banking information. The solution has been implemented on the Java programming language in programming environment IntelliJ IDEA 8, using Java Cryptography Extension (JCE) for digital signature.
|
22 |
Limitations of Geometric Hashing in the Presence of Gaussian NoiseSarachik, Karen B. 01 October 1992 (has links)
This paper presents a detailed error analysis of geometric hashing for 2D object recogition. We analytically derive the probability of false positives and negatives as a function of the number of model and image, features and occlusion, using a 2D Gaussian noise model. The results are presented in the form of ROC (receiver-operating characteristic) curves, which demonstrate that the 2D Gaussian error model always has better performance than that of the bounded uniform model. They also directly indicate the optimal performance that can be achieved for a given clutter and occlusion rate, and how to choose the thresholds to achieve these rates.
|
23 |
Space Efficient 3D Model IndexingJacobs, David W. 01 February 1992 (has links)
We show that we can optimally represent the set of 2D images produced by the point features of a rigid 3D model as two lines in two high-dimensional spaces. We then decribe a working recognition system in which we represent these spaces discretely in a hash table. We can access this table at run time to find all the groups of model features that could match a group of image features, accounting for the effects of sensing error. We also use this representation of a model's images to demonstrate significant new limitations of two other approaches to recognition: invariants, and non- accidental properties.
|
24 |
The Authentication Scheme Based on IBC and Chameleon Hashing for Vehicular Ad-Hoc NetworksChen, Liang-Chih 20 July 2011 (has links)
In the VANET environment, the security of traffic information between vehicles is very important. The messages need to be real-time, and the complexity of authentication should be low. Our proposed method focus on the identity verification based on bilinear pairing, therefore, vehicles, roadside units (RSUs), central authorities (CAs) and trust authority (TA) can verify the identity of each other. After the identity authentication, RSUs will broadcast messages containing chameleon hashing values of verified vehicles, to the other RSUs and vehicles. In the future, vehicles can communicate with the verified vehicles, and verify the messages by these chameleon hashing values.
The advantages of the propose method is mainly: 1. Based on the identity-based cryptography (i.e. IBC), the vehicles, RSUs, CAs and TA can verify the message each other. 2. The vehicles can verify the source and legitimacy of the public/private key. 3. The vehicles do not need to show any certificate to verify the identity, avoiding the certificate is exposed for a long time and causing attacks. 4. We can verify the messages through chameleon function and does not need to wait for RSU to verify, it would have good latency performance. 5. We don¡¦t need to re-verify the identity and consult the common keys when the vehicles hand off within the different cover ranges of the RSUs. 6. Not only within the RSUs, our proposal but also can execute in somewhere without RSU. Finally, our proposal method can fulfill the authentication, data integrity, non-repudiation, condition-privacy and untraceable.
|
25 |
An Anonymous Authentication and Key Agreement Scheme in VANETsLiu, Jian-You 23 July 2012 (has links)
Vehicular ad-hoc network (VANETs) has been a hot research topic in recent years. In this environment, each vehicle can broadcast messages to other vehicles and inform drivers to change their route right away in order to enhance the efficiency of driving and to avoid accidents. Since vehicles communicate through wireless tunnel, many malicious attacks may occur during the transmission of messages. Consequently, ensuring the correctness of receiving messages and verifying the authenticity of the sender is necessary. Besides, we also need to protect the real identities of vehicles from revealing to guarantee the privacy. To satisfy these security properties, many related researches have been proposed. However, they all have some drawbacks. For example: 1. The cost of the certificate management and the exposure problem of the certificate. 2. Waiting for RSU to verify the messages: Once more vehicles need RSU, RSU will have much more overhead and it can¡¦t achieve real-time authentication.
In this thesis, we come up with an anonymous authentication and key agreement scheme based on chameleon hashing and ID-based cryptography in the vehicular communication environment. In our scheme, every vehicle can generate many different chameleon hash values to represent itself, and others can prove the ownership of chameleon hash value. Furthermore, unlike other pseudonymous authentication schemes, we also achieve one-to-one private communication via ID-based cryptography. Finally, we not only overcome some problems in previous works but also fulfill some necessary security requirements in vehicular communication environment.
|
26 |
A dynamic hashing approach to supporting load balance in P2P systemsLi, Sih-ning 19 June 2006 (has links)
In a P2P (Peer-to-Peer) system, every user node, i.e., the peer, may dynamically join and leave the system. In general, peers can exchange information and contribute portions of their resources to the community in a P2P system. They are treated functionally identical. Therefore, it is very important to efficiently locate the peer that stores a particular data item and make the system load balance in P2P systems. Chord is a structured P2P system which has a ring architecture, where a structured P2P system means that peers maintain information about what resources neighbor peers offer.
It provides support for just one operation: to assign the data key to the peer by hashing. Therefore, we can efficiently locate the peer that stores a particular data key. However, in the Chord system, most of data keys may be assigned to the same peer by using the static hashing scheme, which results in the case that the load of the system not be balanced. Therefore, in this thesis, we propose a strategy which uses the dynamic hashing scheme to locate the data key based on the Chord architecture, and to maintain the load balance. A dynamic hashing allows the address space allocated to the file to be increased and reduced without reorganizing the whole file. The basic idea of a dynamic hashing approach is to split the current overflow bucket into two new buckets by using the next level hashing function without reorganizing the other buckets, and our proposed strategy uses such an approach.
In our strategy, we use two data structures for a peer, one stores the data hashed to the current peer and the other one stores the data from its predecessor. When an overflow occurs in the bucket after insertion of a data key, we use the one hashing function to split data keys stored in the data bucket. If the capacity of the current peer is larger than that of its successor, we forward some data keys to the successor. Similarly, we also consider the case of an underflow occurs in the bucket after deletion of a data key. Therefore, the unbalanced condition of the load (even distribution of items to nodes) of the system can be improved based on our strategy.
From our simulation results, we show that the load of the P2P system based on our strategy is much more balanced than that used in the Chord system, when there are few peers and a lot of data keys in the P2P system. We also show that the load based on our strategy is still more balanced than that used in the Chord system, when the data distribution becomes skew.
|
27 |
Design, fabrication and implementation of a hash table processor /Ketrick, Robert Paul. January 1987 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 1987. / Includes bibliographical references.
|
28 |
A generic attack on hashing-based software tamper resistance /Wurster, Glenn, January 1900 (has links)
Thesis (M.C.S.) - Carleton University, 2005. / Includes bibliographical references (p. 107-115). Also available in electronic format on the Internet.
|
29 |
Performance analysis of a scalable hardware FPGA Skein implementation /Schorr, Aric. January 2010 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2010. / Typescript. Includes bibliographical references (leaves 57-58).
|
30 |
On the security and efficiency of encryptionCash, Charles David. January 2009 (has links)
Thesis (Ph.D)--Computing, Georgia Institute of Technology, 2010. / Committee Chair: Boldreva, Alexandra; Committee Member: Ahamad, Mustaque; Committee Member: Randall, Dana; Committee Member: Tetali, Prasad; Committee Member: Traynor, Patrick. Part of the SMARTech Electronic Thesis and Dissertation Collection.
|
Page generated in 0.062 seconds