Abstract: Recent years have seen extensive adoption of blockchain technology across a variety of application domains, all with the goal of enhancing data privacy, system trustworthiness, and security.
Cache conscious hash map and hash set for strings based on the "Cache-conscious collision resolution in string hash tables." (Askitis Nikolas and Justin Zobel, 2005) paper. You can find some details ...
Abstract: Protection of integrated circuits (ICs) against hardware security threats has been tackled by many schemes proposed to mitigate risks associated with an unauthorized access and usage of ICs ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results