Skip to search formSkip to main contentSkip to account menu

Collision (computer science)

Known as: Collision (disambiguation), Hash collision, Cryptographic hash collision 
In computer science, a collision or clash is a situation that occurs when two distinct pieces of data have the same hash value, checksum, fingerprint… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Focus of this research work is optimizing the deduplication system by adjusting the pertinent factors in content defined chunking… 
2017
2017
-- Duplicate detection is the process of identifying multiple representations of same real world entities. The proposed System… 
2013
2013
Galois/Counter Mode (GCM) is a block cipher mode of operation widely adopted in many practical applications and standards, such… 
2012
2012
Data mining is the use of automated data analysis techniques to uncover previously undetected relationships among data items. In… 
2012
2012
  • M. Kohnen
  • 2012
  • Corpus ID: 7816538
Trust and reputation management in peer-to-peer (P2P) networks is a current topic. Most of the works focus on unstructured… 
2011
2011
In WAVE applications, the safety information of neighboring vehicles must be collected as quickly and efficiently as possible… 
2008
2008
The increasingly more stringent performance and power requirements of Internet routers call for scalable IP lookup strategies… 
2006
2006
Distributed Denial-of-Service (DDoS) attacks pose a serious threat to Internet security. Most current research focuses on… 
2006
2006
Hash tables are often used in LAN switching devices for MAC address lookup. The lookup is a central function, which significantly… 
2004
2004
CAM-DH is a publickey-based protocol for secure binding updates in Mobile IP V.6 (MIPv6), which combines the BAKE/2 protocol with…