Author:
Agarwal Arushi,Pathak Sashakt,Agarwal Sakshi
Reference17 articles.
1. Mun, H.-J., Hong, S., Shin, J.: A novel secure and efficient hash function with extra padding against rainbow table attacks. Cluster Comput. 21(1), 1161–1173 (2018)
2. Sapuntzakis, C.P., Chandra, R., Pfaff, B., Chow, J., Lam, M.S., Rosenblum, M.: Optimizing the migration of virtual computers. In: 5th Symposium on Operating Systems Design and Implementation, pp. 377–390 (2002)
3. Broder, A., Mitzenmacher, M.: Using multiple hash functions to improve IP lookups. In: IEEE, INFOCOM (2001), pp. 1454–1463
4. Nimbe, P., Frimpong, S.O., Opoku, M.: An efficient strategy for collision resolution in hash tables. Int. J. Comput. Appl. 99(10), 35–41 (2014)
5. Lecture Notes in Computer Science;N Askitis,2005
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Comparative Study of Hashing and Analysis of Collision Resolution Techniques;2023 International Conference on IoT, Communication and Automation Technology (ICICAT);2023-06-23