Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,134,353 papers from all fields of science
Search
Sign In
Create Free Account
Hash function
Known as:
Hashing algorithm
, Hashing function
, Hashlink
Expand
A hash function is any function that can be used to map data of arbitrary size to data of fixed size. The values returned by a hash function are…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Abstract data type
Artificial intelligence (video games)
Backup
Biological database
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Secure Tag Search in RFID Systems Using Mobile Readers
S. Sundaresan
,
R. Doss
,
S. Piramuthu
,
Wanlei Zhou
IEEE Transactions on Dependable and Secure…
2015
Corpus ID: 16905346
One of the important features of an RFID system is its ability to search for a particular tag among a group of tags. In order to…
Expand
Highly Cited
2011
Highly Cited
2011
Forwarding anomalies in Bloom filter-based multicast
Mikko Särelä
,
Christian Esteve Rothenberg
,
T. Aura
,
A. Zahemszky
,
P. Nikander
,
J. Ott
Proceedings IEEE INFOCOM
2011
Corpus ID: 14666485
Several recently proposed multicast protocols use in-packet Bloom filters to encode multicast trees. These mechanisms are in…
Expand
Highly Cited
2008
Highly Cited
2008
Random subspace for an improved BioHashing for face authentication
L. Nanni
,
A. Lumini
Pattern Recognition Letters
2008
Corpus ID: 6781984
Highly Cited
2008
Highly Cited
2008
Range queries on structured overlay networks
T. Schütt
,
F. Schintke
,
A. Reinefeld
Computer Communications
2008
Corpus ID: 28875271
Highly Cited
2006
Highly Cited
2006
What's New in SAS® 9.1.3 for Clinical Programmers
Dave Smith
2006
Corpus ID: 61731619
SAS 9 has brought a wealth of new features for a huge variety of industries, and it is often difficult to spot the details that…
Expand
Highly Cited
2005
Highly Cited
2005
H.264/AVC video authentication using skipped macroblocks for an erasable watermark
Dima Pröfrock
,
H. Richter
,
M. Schlauweg
,
E. Müller
Visual Communications and Image Processing
2005
Corpus ID: 15826220
This paper presents a new watermarking framework, suitable for authentication of H.264 compressed videos. The authentication data…
Expand
Highly Cited
2005
Highly Cited
2005
An improvement of Hwang-Lee-Tang's simple remote user authentication scheme
Eunjun Yoon
,
Eun-Kyung Ryu
,
K. Yoo
Computers & security
2005
Corpus ID: 194579
Highly Cited
2004
Highly Cited
2004
Secure Hashed Diffie-Hellman over Non-DDH Groups
R. Gennaro
,
H. Krawczyk
,
T. Rabin
International Conference on the Theory and…
2004
Corpus ID: 267015
The Diffie-Hellman (DH) transform is a basic cryptographic primitive used in innumerable cryptographic applications, most…
Expand
Highly Cited
1999
Highly Cited
1999
Licit and Illicit Drug Use in the Netherlands, 1997
P. Cohen
,
M. Abraham
,
R. Til
1999
Corpus ID: 132571741
Niets uit deze uitgave mag worden verveelvoudigd en/of openbaar gemaakt door middel van druk, fotokopie of op welke andere wijze…
Expand
Highly Cited
1988
Highly Cited
1988
PLOP-hashing: A grid file without directory
H. Kriegel
,
B. Seeger
Proceedings. Fourth International Conference on…
1988
Corpus ID: 16365108
The authors consider the case of nonuniform weakly correlated or independent multidimensional record distributions. After…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE