Memory efficient sanitization of a deduplicated storage system using a perfect hash function
2016-09-21 Assigned to CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS
COLLATERAL AGENT reassignment CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH …
COLLATERAL AGENT reassignment CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH …
Memory efficient sanitization of a deduplicated storage system
G06F 12/00(2006.01) G06F 3/06(2006.01)(57) ABSTRACT G06F 2/08(2016.01) Techniques
for sanitizing a storage system are described (52) US Cl. herein. In one embodiment, for …
for sanitizing a storage system are described (52) US Cl. herein. In one embodiment, for …
Memory efficient sanitization of a deduplicated storage system
Sanitization is the process of securely erasing sensitive data from a storage system,
effectively restoring the system to a state as if the sensitive data had never been stored …
effectively restoring the system to a state as if the sensitive data had never been stored …
[PDF][PDF] Near-optimal space perfect hashing algorithms
A perfect hash function (PHF) is an injective function that maps keys from a set S to unique
values. Since no collisions occur, each key can be retrieved from a hash table with a single …
values. Since no collisions occur, each key can be retrieved from a hash table with a single …
Consistency analysis on orientation features for fast and accurate palmprint identification
F Yue, W Zuo - Information Sciences, 2014 - Elsevier
A typical palmprint identification system identifies a query palmprint by matching it with the
templates in the database and comparing the similarity score with a pre-defined threshold …
templates in the database and comparing the similarity score with a pre-defined threshold …
Computing the conjugate of convex piecewise linear-quadratic bivariate functions
B Gardiner, Y Lucet - Mathematical Programming, 2013 - Springer
We present a new algorithm to compute the Legendre–Fenchel conjugate of convex
piecewise linear-quadratic (PLQ) bivariate functions. The algorithm stores a function using a …
piecewise linear-quadratic (PLQ) bivariate functions. The algorithm stores a function using a …
A modified MD5 algorithm incorporating hirose compression function
FJB Talirongan, AM Sison… - 2018 IEEE 10th …, 2018 - ieeexplore.ieee.org
Hashing is the widely used method in cryptographic protocols and the data integrity check.
Among the most utilized cryptographic hashing functions is the MD5 for a variety of …
Among the most utilized cryptographic hashing functions is the MD5 for a variety of …