DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» LSH (hash function)
LSH (hash function)
Secure Multi Keyword Fuzzy with Semantic Expansion Based Search Over Encrypted Cloud Data
Lower Bounds on Lattice Sieving and Information Set Decoding
Efficient (Ideal) Lattice Sieving Using Cross-Polytope
Murari Lal (India), Hideo Harasawa (Japan), and Daniel Murdiyarso (Indonesia)
Efficient Similarity Search Over Encrypted Data
Implementation of Locality Sensitive Hashing Techniques
Evaluation of Scalable Pprl Schemes with a Native Lsh Database Engine
Crypto-Aided MAP Detection and Mitigation of False Data in Wireless Relay Networks
Symmetric Cryptography
Hashing Techniques: a Survey and Taxonomy
Comparison of Hash Function Algorithms Against Attacks: a Review
2021-2022 Bulletin
A Unified Framework for Secure Search Over Encrypted Cloud Data
Analysis and Implementation of Estream and SHA-3 Cryptographic Algorithms
Introduction to Locality-Sensitive Hashing
Fast Implementation of LSH with SIMD
A Study on the Concept of Using Efficient Lightweight Hash Chain To
Efficient Similarity Search Over Encrypted Data on Cloud
Top View
Masking Fuzzy-Searchable Public Databases
Minhash-Based Fuzzy Keyword Search of Encrypted Data Across Multiple Cloud Servers
Privacy-Enhancing Context Authentication from Location-Sensitive Data Pradip Mainali Carlton Shepherd Fabien A
Multimedia Information Retrieval Copyright © 2010 by Morgan & Claypool
Global Airport Codes
Usable Everlasting Encryption Using the Pornography Infrastructure Enka Blanchard, Siargey Kachanovich
Identifying Harmful Media in End-To-End Encrypted Communication: Efficient Private Membership Computation
Cryptography Using the Pornography Infrastructure
Basic Cryptography
Nettle Manual for the Nettle Library Version 3.4
Conversational Dari: an Introductory Course in Dari (=Farsi=Persian) As Spoken in Afghanistan