Essays about: "Hash Functions"
Showing result 1 - 5 of 21 essays containing the words Hash Functions.
-
1. Improving network performance with a polarization-aware routing approach
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Traffic polarization in networks refers to the phenomenon where traffic tends to concentrate along specific routes or edges when doing multipath routing, leading to imbalanced flow patterns. This spatial distribution of traffic can result in congested and overburdened links, while other routes remain underutilized. READ MORE
-
2. Subtree Hashing of Tests in Build Systems : Rust Tricorder
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Software applications are built by teams of developers that constantly iterate over the codebase. Software projects rely on a build system, which handles the management of dependencies, compilation, testing, and deployment of the software. READ MORE
-
3. An Arrow Metalanguage for Partially Invertible Computation
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Programming languages traditionally describe computations going one way: a program might compute a hash value from a string, or an encrypted message from a plaintext. However, sometimes it is also of interest to go the other way around: for encryption, we not only want to encrypt messages but also to decrypt them, and to be sure that the decryption correctly reproduces the original message. READ MORE
-
4. Authentication Techniques Based on Physical Layer Attributes
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Authentication is an indispensable part of information security. It serves to distinguish legitimate users from unauthorized ones. With the rapid growth of Internet of Things (IoT) devices, authentication of wireless communication is gathering more and more attention. READ MORE
-
5. Puzzle-based Clogging DoS-resilient Vehicular Communications
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In Vehicular Communication Systems (VCSs), authenticated safety beacons are used to deliver the vehicles’ status and provide necessary information for the applications. However, high rate safety beacons impose high processing overhead on the resource-constrained vehicular On-Board Units (OBUs). READ MORE