Login / Signup
A secured Cryptographic Hashing Algorithm
Rakesh Mohanty
Niharjyoti Sarangi
Sukant kumar Bishi
Published in:
CoRR (2010)
Keyphrases
</>
hashing algorithm
hash functions
bit wise
similarity search
data distribution
encryption scheme
information security
training data
smart card
social networks
secret key
neural network
nearest neighbor
data sets
similarity measure
data mining
security analysis
real world