Memory efficient sanitization of a deduplicated storage system using a perfect hash function

FC Botelho, N Garg, PN Shilane, G Wallace - US Patent 9,317,218, 2016 - Google Patents
2016-09-21 Assigned to CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS
COLLATERAL AGENT reassignment CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH …

Memory efficient sanitization of a deduplicated storage system

FC Botelho, N Garg, PN Shilane, G Wallace - US Patent 9,430,164, 2016 - Google Patents
G06F 12/00(2006.01) G06F 3/06(2006.01)(57) ABSTRACT G06F 2/08(2016.01) Techniques
for sanitizing a storage system are described (52) US Cl. herein. In one embodiment, for …

Memory efficient sanitization of a deduplicated storage system

FC Botelho, P Shilane, N Garg, W Hsu - 11th USENIX Conference on …, 2013 - usenix.org
Sanitization is the process of securely erasing sensitive data from a storage system,
effectively restoring the system to a state as if the sensitive data had never been stored …

[PDF][PDF] Near-optimal space perfect hashing algorithms

FC Botelho, N Ziviani - The thesis of PhD. in Computer …, 2008 - homepages.dcc.ufmg.br
A perfect hash function (PHF) is an injective function that maps keys from a set S to unique
values. Since no collisions occur, each key can be retrieved from a hash table with a single …

Consistency analysis on orientation features for fast and accurate palmprint identification

F Yue, W Zuo - Information Sciences, 2014 - Elsevier
A typical palmprint identification system identifies a query palmprint by matching it with the
templates in the database and comparing the similarity score with a pre-defined threshold …

Computing the conjugate of convex piecewise linear-quadratic bivariate functions

B Gardiner, Y Lucet - Mathematical Programming, 2013 - Springer
We present a new algorithm to compute the Legendre–Fenchel conjugate of convex
piecewise linear-quadratic (PLQ) bivariate functions. The algorithm stores a function using a …

A modified MD5 algorithm incorporating hirose compression function

FJB Talirongan, AM Sison… - 2018 IEEE 10th …, 2018 - ieeexplore.ieee.org
Hashing is the widely used method in cryptographic protocols and the data integrity check.
Among the most utilized cryptographic hashing functions is the MD5 for a variety of …