Essays about: "Hash Functions"

Showing result 1 - 5 of 21 essays containing the words Hash Functions.

  1. 1. Improving network performance with a polarization-aware routing approach

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jingyi Pan; [2023]
    Keywords : Traffic engineering; Hash function; Multipath routing; Trafikteknik; Hash-funktion; Flervägsdirigering;

    Abstract : Traffic polarization in networks refers to the phenomenon where traffic tends to concentrate along specific routes or edges when doing multipath routing, leading to imbalanced flow patterns. This spatial distribution of traffic can result in congested and overburdened links, while other routes remain underutilized. READ MORE

  2. 2. Subtree Hashing of Tests in Build Systems : Rust Tricorder

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Calin Capitanu; [2023]
    Keywords : Build systems; tests execution; caching; Abstract Syntax Tree parsing; Sisteme de construire; Teste; Memorare in cache; Arbore sintactic abstract; Bygg system; tester; cachelagring; analys av abstrakt syntaxträd;

    Abstract : Software applications are built by teams of developers that constantly iterate over the codebase. Software projects rely on a build system, which handles the management of dependencies, compilation, testing, and deployment of the software. READ MORE

  3. 3. An Arrow Metalanguage for Partially Invertible Computation

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Anders Ågren Thuné; [2023]
    Keywords : Reversible computation; Domain-specific languages; Arrows; Partial invertibility; Reversibel beräkning; Domänspecifika språk; Arrows; Partiell inverterbarhet;

    Abstract : Programming languages traditionally describe computations going one way: a program might compute a hash value from a string, or an encrypted message from a plaintext. However, sometimes it is also of interest to go the other way around: for encryption, we not only want to encrypt messages but also to decrypt them, and to be sure that the decryption correctly reproduces the original message. READ MORE

  4. 4. Authentication Techniques Based on Physical Layer Attributes

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Xintai Liang; [2022]
    Keywords : Wireless security; Spoofing attacks; Physical layer authentication; Channel State Information; Machine learning; Trådlös säkerhet; Spoofing attack; Autentisering av fysiska lager; Kanaltill Stånds Information; Maskinin lärning;

    Abstract : Authentication is an indispensable part of information security. It serves to distinguish legitimate users from unauthorized ones. With the rapid growth of Internet of Things (IoT) devices, authentication of wireless communication is gathering more and more attention. READ MORE

  5. 5. Puzzle-based Clogging DoS-resilient Vehicular Communications

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Zhichao Zhou; [2022]
    Keywords : On-Board Units OBUs ; Denial of Service DoS ; Puzzle scheme; Hash function; Pre-authenticate; On-Board Units OBUs ; Denial of Service DoS ; Pusselsystemet; Hashfunktioner; Förautentisera;

    Abstract : In Vehicular Communication Systems (VCSs), authenticated safety beacons are used to deliver the vehicles’ status and provide necessary information for the applications. However, high rate safety beacons impose high processing overhead on the resource-constrained vehicular On-Board Units (OBUs). READ MORE