2019
DOI: 10.1016/j.asoc.2019.02.014
|View full text |Cite
|
Sign up to set email alerts
|

Evolutionary hash functions for specific domains

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 17 publications
(5 citation statements)
references
References 16 publications
0
5
0
Order By: Relevance
“…Since the analyzed PUF responses are image-based responses, perceptual hash functions are used to convert the images into fixed-length digital outputs. The hash vectors or values are generated to identify unequivocally the original content [11], [42]. Therefore, the resultant image is subjected to a preprocessing stage, and the hash extraction results in a hash identifier that is saved on a database.…”
Section: A Authentication Methodologymentioning
confidence: 99%
“…Since the analyzed PUF responses are image-based responses, perceptual hash functions are used to convert the images into fixed-length digital outputs. The hash vectors or values are generated to identify unequivocally the original content [11], [42]. Therefore, the resultant image is subjected to a preprocessing stage, and the hash extraction results in a hash identifier that is saved on a database.…”
Section: A Authentication Methodologymentioning
confidence: 99%
“…The resulting hash function performed 2.7 to 7 times faster and inserted 1.6% more keys than the state-ofthe-art for specific datasets. Saez et al [28] used the same GP algorithm as in their earlier work [11] but only changed the fitness function to collision rate to evolve a NC hash function called GP-Hash-AdHoc. They compared their results to the state-of-the-art, and for some datasets, they managed to improve upon collision rates.…”
Section: Related Workmentioning
confidence: 99%
“…The other attributes of contents, such as the name, size are also computed. The hash key of content is essential for assigning an index of content in the SBS cache [55][56][57]. When MS intends to upload content, the first step is to generate a hash key and another set of content attributes.…”
Section: Network Modelmentioning
confidence: 99%