A Bibliography of Publications on Hashing Algorithms - Index of files in
A Bibliography of Publications on Hashing Algorithms - Index of files in
A Bibliography of Publications on Hashing Algorithms - Index of files in
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
REFERENCES 125<br />
[CLS12]<br />
[CLW98]<br />
Chen:2012:EDI<br />
L<strong>on</strong>g Chen, Banglan Liu, and<br />
Wei S<strong>on</strong>g. An efficient data <strong>in</strong>tegrity<br />
verificati<strong>on</strong> method support<strong>in</strong>g<br />
multi-granular operati<strong>on</strong><br />
with commutative hash.<br />
Lecture Notes <strong>in</strong> CS, 7413:<br />
132–141, 2012. CODEN<br />
LNCSD9. ISSN 0302-9743<br />
(pr<strong>in</strong>t), 1611-3349 (electr<strong>on</strong>ic).<br />
URL http://l<strong>in</strong>k.spr<strong>in</strong>ger.<br />
com/chapter/10.1007/978-3-<br />
642-32115-3_15/.<br />
Chu:1998:EHB<br />
K. W. Chu, S. K. Lam, and<br />
M. H. W<strong>on</strong>g. An efficient hashbased<br />
algorithm for sequence<br />
data search<strong>in</strong>g. The Computer<br />
Journal, 41(6):402–415,<br />
???? 1998. CODEN CMPJA6.<br />
ISSN 0010-4620 (pr<strong>in</strong>t), 1460-<br />
2067 (electr<strong>on</strong>ic). URL http:<br />
//www3.oup.co.uk/computer_<br />
journal/Volume_41/Issue_<br />
06/Vol41_06.body.html#AbstractChu.<br />
Chen:1992:USR<br />
[CLYY92] M-S. Chen, M. L. Lo, P. S.<br />
Yu, and H. C. Young. Us<strong>in</strong>g<br />
segmented right-deep trees<br />
for the executi<strong>on</strong> <str<strong>on</strong>g>of</str<strong>on</strong>g> pipel<strong>in</strong>ed<br />
hash jo<strong>in</strong>s. In Yuan [Yua92],<br />
page 15. ISBN 1-55860-151-1.<br />
LCCN QA76.9.D3 I61 1992.<br />
[CLYY95]<br />
Chen:1995:ASR<br />
M<strong>in</strong>g-Syan Chen, M<strong>in</strong>gl<strong>in</strong>g Lo,<br />
Philip S. Yu, and H<strong>on</strong>esty C.<br />
Young. Apply<strong>in</strong>g segmented<br />
right-deep trees to pipel<strong>in</strong><strong>in</strong>g<br />
multiple hash jo<strong>in</strong>s. IEEE<br />
Transacti<strong>on</strong>s <strong>on</strong> Knowledge and<br />
Data Eng<strong>in</strong>eer<strong>in</strong>g, 7(4):656–??,<br />
August 1, 1995. CODEN IT-<br />
KEEH. ISSN 1041-4347.<br />
Czech:1993:LTA<br />
[CM93] Zbigniew J. Czech and Bohdan<br />
S. Majewski. A l<strong>in</strong>ear<br />
time algorithm for f<strong>in</strong>d<strong>in</strong>g<br />
m<strong>in</strong>imal perfect hash functi<strong>on</strong>s.<br />
The Computer Journal,<br />
36(6):579–587, December<br />
1993. CODEN CMPJA6. ISSN<br />
0010-4620 (pr<strong>in</strong>t), 1460-2067<br />
(electr<strong>on</strong>ic). URL http://<br />
comjnl.oxfordjournals.org/<br />
c<strong>on</strong>tent/36/6/579.full.pdf+<br />
html; http://www3.oup.<br />
co.uk/computer_journal/Volume_<br />
36/Issue_06/Vol36_06.body.<br />
html#AbstractCzech.<br />
Christophi:2001:DSR<br />
[CM01] C. A. Christophi and H. M.<br />
Mahmoud. Distributi<strong>on</strong> <str<strong>on</strong>g>of</str<strong>on</strong>g> the<br />
size <str<strong>on</strong>g>of</str<strong>on</strong>g> random hash trees, pebbled<br />
hash trees and N-trees.<br />
Statistics & Probability Letters,<br />
53(3):277–282, June 15, 2001.<br />
CODEN SPLTDC. ISSN 0167-<br />
7152 (pr<strong>in</strong>t), 1879-2103 (electr<strong>on</strong>ic).<br />
C<strong>on</strong>t<strong>in</strong>i:2007:EFA<br />
[CMP07] Scott C<strong>on</strong>t<strong>in</strong>i, Krystian Matusiewicz,<br />
and Josef Pieprzyk.<br />
Extend<strong>in</strong>g FORK-256<br />
attack to the full hash functi<strong>on</strong>.<br />
Lecture Notes <strong>in</strong> CS,<br />
4861:296–305, 2007. CO-<br />
DEN LNCSD9. ISSN 0302-<br />
9743 (pr<strong>in</strong>t), 1611-3349 (electr<strong>on</strong>ic).<br />
URL http://l<strong>in</strong>k.<br />
spr<strong>in</strong>ger.com/c<strong>on</strong>tent/pdf/