Using hash functions to protect critical messages from changes in risky computing systems.
Andrzej SmolarzNadia PasiekaAndrzej KotyraVasyl SheketaMykola PasiekaSvitlana ChupakhinaPetro KrulMykola SuprunPublished in: CITRisk (2021)
Keyphrases
- computing systems
- hash functions
- computer systems
- computing technologies
- similarity search
- order preserving
- locality sensitive
- computing platform
- autonomic computing
- parallel computing
- data distribution
- high end
- secret key
- hamming distance
- block cipher
- locality sensitive hashing
- approximate similarity search
- minimal perfect hash functions
- neural network
- ubiquitous computing environments
- nearest neighbor search
- software developers
- query processing
- data mining
- hashing methods