-
1
-
-
50249123191
-
A GPU-Based Multiple-Pattern Matching Algorithm for Network Intrusion Detection Systems
-
N-F. Huang, H-W. Hung, S-H. Lai, Y-M. Chu, and W-Y. Tsai, "A GPU-Based Multiple-Pattern Matching Algorithm for Network Intrusion Detection Systems" in 22nd International Conference on Advanced Information Networking and Applications, 2008.
-
(2008)
22nd International Conference on Advanced Information Networking and Applications
-
-
Huang, N.-F.1
Hung, H.-W.2
Lai, S.-H.3
Chu, Y.-M.4
Tsai, W.-Y.5
-
2
-
-
63349100651
-
-
R. L. Rivest, The MD5 Message Digest Algorithm, Internet RFC 131, 1992, retrieved January 18, 2008, from http://people.csail.mit.edu/rivest/ Rivest-MD5.txt
-
R. L. Rivest, "The MD5 Message Digest Algorithm," Internet RFC 131, 1992, retrieved January 18, 2008, from http://people.csail.mit.edu/rivest/ Rivest-MD5.txt
-
-
-
-
3
-
-
0003629990
-
-
Retrieved January 18, 2008 from
-
NIST-ITL, "Secure Hash Standard (SHS)," 2002, Retrieved January 18, 2008 from http://csrc.nist.gov/publications/fips/fips180-2/fips180-2.pdf.
-
(2002)
Secure Hash Standard (SHS)
-
-
-
4
-
-
0024065804
-
Computation of Cyclic Redundancy Checks via Table Look-Up
-
D. V. Sarwate, "Computation of Cyclic Redundancy Checks via Table Look-Up," Communications of the ACM, 31(8), 1988.
-
(1988)
Communications of the ACM
, vol.31
, Issue.8
-
-
Sarwate, D.V.1
-
5
-
-
46649106142
-
An Empirical Analysis of Disk Sector Hashes for Data Carving
-
Y. S. Dandass, N. J. Necaise, and S. R. Thomas, "An Empirical Analysis of Disk Sector Hashes for Data Carving," Journal of Digital Forensic Practice, 2(2), 2008
-
(2008)
Journal of Digital Forensic Practice
, vol.2
, Issue.2
-
-
Dandass, Y.S.1
Necaise, N.J.2
Thomas, S.R.3
-
7
-
-
34447525132
-
Multiresolution similarity hashing
-
V. Roussev, G. G. Richard III, and L. Marziale, "Multiresolution similarity hashing," Digital Investigation, 4(S1), 2007.
-
(2007)
Digital Investigation
, vol.4
, Issue.S1
-
-
Roussev, V.1
Richard III, G.G.2
Marziale, L.3
-
9
-
-
63349094980
-
-
L. Marzialea, G. G. Richard III, and V. Roussev, "Massive threading: Using GPUs to increase the performance of digital forensics tools," 4(S1), 2007.
-
(2007)
Massive threading: Using GPUs to increase the performance of digital forensics tools
, vol.4
, Issue.S1
-
-
Marzialea, L.1
Richard III, G.G.2
Roussev, V.3
-
10
-
-
37249079751
-
Line-by-line spectroscopic simulations on graphics processing units
-
S. Collange, M. Daumas and D. Defour, "Line-by-line spectroscopic simulations on graphics processing units", Computer Physics Communications, 178(2), 2008.
-
(2008)
Computer Physics Communications
, vol.178
, Issue.2
-
-
Collange, S.1
Daumas, M.2
Defour, D.3
-
11
-
-
44849137198
-
NVidia Tesla: A unified graphics and computing architecture
-
E. Lindholm, J. Nickolls, S. Oberman, and J. Montrym, "NVidia Tesla: A unified graphics and computing architecture", IEEE Micro, 28(2).
-
IEEE Micro
, vol.28
, Issue.2
-
-
Lindholm, E.1
Nickolls, J.2
Oberman, S.3
Montrym, J.4
-
12
-
-
54049151235
-
Novel Table Lookup-Based Algorithms for High Performance CRC Generation
-
20 May
-
M. E. Kounavis and F. L. Berry, "Novel Table Lookup-Based Algorithms for High Performance CRC Generation", IEEE Transaction on Computers, 20 May, 2008.
-
(2008)
IEEE Transaction on Computers
-
-
Kounavis, M.E.1
Berry, F.L.2
-
13
-
-
33745712693
-
High-Speed FPGA Implementation of Secure Hash Algorithm for IPSec and VPN Applications
-
A. P. Kakarountas, H. Michail, A. Milidonis, C. E. Goutis, and G. Theodoridis., "High-Speed FPGA Implementation of Secure Hash Algorithm for IPSec and VPN Applications," Journal of Supercomputing, 37(2).
-
Journal of Supercomputing
, vol.37
, Issue.2
-
-
Kakarountas, A.P.1
Michail, H.2
Milidonis, A.3
Goutis, C.E.4
Theodoridis, G.5
|