Sciweavers

648 search results - page 54 / 130
» Authenticated hash tables
Sort
View
IEEEMSP
2002
IEEE
156views Multimedia» more  IEEEMSP 2002»
14 years 2 months ago
A robust and secure media signature scheme for JPEG images
—In [1, 2, 3], we have introduced a robust and secure digital signature solution for multimedia content authentication, by integrating content feature extraction, error correctio...
Qibin Sun, Qi Tian, Shih-Fu Chang
IACR
2011
88views more  IACR 2011»
12 years 9 months ago
GCM, GHASH and Weak Keys
The Galois/Counter Mode (GCM) of operation has been standardized by NIST to provide single-pass authenticated encryption. The GHASH authentication component of GCM belongs to a cla...
Markku-Juhani O. Saarinen
DASFAA
2007
IEEE
135views Database» more  DASFAA 2007»
14 years 4 months ago
A Development of Hash-Lookup Trees to Support Querying Streaming XML
Abstract. The rapid growth in the amount of XML data and the development of publish-subscribe systems have led to great interest in processing streaming XML data. We propose the Qs...
James Cheng, Wilfred Ng
GLOBECOM
2008
IEEE
13 years 10 months ago
Highly Memory-Efficient LogLog Hash for Deep Packet Inspection
As the network line rates reach 40 Gbps today and 100 Gbps in the near future, performing deep packet inspection (DPI) in the Network Intrusion Detection and Prevention Systems (NI...
Masanori Bando, N. Sertac Artan, H. Jonathan Chao
ISCA
2010
IEEE
214views Hardware» more  ISCA 2010»
13 years 12 months ago
Translation caching: skip, don't walk (the page table)
This paper explores the design space of MMU caches that accelerate virtual-to-physical address translation in processor architectures, such as x86-64, that use a radix tree page t...
Thomas W. Barr, Alan L. Cox, Scott Rixner